var-201603-0033
Vulnerability from variot
Cisco NX-OS 6.0(2)U6(1) through 6.0(2)U6(5) on Nexus 3000 devices and 6.0(2)A6(1) through 6.0(2)A6(5) and 6.0(2)A7(1) on Nexus 3500 devices has hardcoded credentials, which allows remote attackers to obtain root privileges via a (1) TELNET or (2) SSH session, aka Bug ID CSCuy25800. Cisco Nexus is Cisco's line of network switches designed for data centers. This vulnerability is caused by a user account created during installation that cannot be deleted or changed. The password is also static by default. Allows an unauthenticated remote attacker to log in to the device as root and has bashshell access. NX-OS Software is a data center operating system running on it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201603-0033", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nx-os on nexus series switches 6.0 u6", "scope": "eq", "trust": 3.0, "vendor": "cisco", "version": "3000" }, { "model": "nx-os on nexus platform switches 6.0 a6", "scope": "eq", "trust": 3.0, "vendor": "cisco", "version": "3500" }, { "model": "gs1900-10hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aazi.0\\)c0" }, { "model": "keymouse", "scope": "eq", "trust": 1.0, "vendor": "zzinc", "version": "3.08" }, { "model": "x14j", "scope": "eq", "trust": 1.0, "vendor": "samsung", "version": "t-ms14jakucb-1102.5" }, { "model": "opensolaris", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "snv_124" }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.0(2)a6(1) to 6.0(2)a6(5) (nexus 3500)" }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.0(2)a7(1) (nexus 3500)" }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.0(2)u6(1) to 6.0(2)u6(5) (nexus 3000)" }, { "model": "nx-os on nexus platform switches 6.0 a7", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "3500" }, { "model": "nexus 3064", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nexus 3048", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nexus 3064t", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nexus 3548", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nexus 3524", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nexus 3064x", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01458" }, { "db": "JVNDB", "id": "JVNDB-2016-001817" }, { "db": "NVD", "id": "CVE-2016-1329" }, { "db": "CNNVD", "id": "CNNVD-201603-011" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)u6\\\\\\(5\\\\\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)u6\\\\\\(4\\\\\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)u6\\\\\\(3\\\\\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)u6\\\\\\(2\\\\\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)u6\\\\\\(1\\\\\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-ox:6.0\\\\\\(2\\\\\\)a7\\\\\\(1\\\\\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)a6\\\\\\(1\\\\\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)a6\\\\\\(5\\\\\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)a6\\\\\\(4\\\\\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)a6\\\\\\(3\\\\\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)a6\\\\\\(2\\\\\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-1329" } ] }, "cve": "CVE-2016-1329", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2016-1329", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2016-01458", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-90148", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-1329", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2016-1329", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-01458", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201603-011", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-90148", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-1329", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01458" }, { "db": "VULHUB", "id": "VHN-90148" }, { "db": "VULMON", "id": "CVE-2016-1329" }, { "db": "JVNDB", "id": "JVNDB-2016-001817" }, { "db": "NVD", "id": "CVE-2016-1329" }, { "db": "CNNVD", "id": "CNNVD-201603-011" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco NX-OS 6.0(2)U6(1) through 6.0(2)U6(5) on Nexus 3000 devices and 6.0(2)A6(1) through 6.0(2)A6(5) and 6.0(2)A7(1) on Nexus 3500 devices has hardcoded credentials, which allows remote attackers to obtain root privileges via a (1) TELNET or (2) SSH session, aka Bug ID CSCuy25800. Cisco Nexus is Cisco\u0027s line of network switches designed for data centers. This vulnerability is caused by a user account created during installation that cannot be deleted or changed. The password is also static by default. Allows an unauthenticated remote attacker to log in to the device as root and has bashshell access. NX-OS Software is a data center operating system running on it", "sources": [ { "db": "NVD", "id": "CVE-2016-1329" }, { "db": "JVNDB", "id": "JVNDB-2016-001817" }, { "db": "CNVD", "id": "CNVD-2016-01458" }, { "db": "VULHUB", "id": "VHN-90148" }, { "db": "VULMON", "id": "CVE-2016-1329" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1329", "trust": 3.2 }, { "db": "SECTRACK", "id": "1035161", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2016-001817", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201603-011", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-01458", "trust": 0.6 }, { "db": "BID", "id": "83945", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-90923", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-90148", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-1329", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01458" }, { "db": "VULHUB", "id": "VHN-90148" }, { "db": "VULMON", "id": "CVE-2016-1329" }, { "db": "JVNDB", "id": "JVNDB-2016-001817" }, { "db": "NVD", "id": "CVE-2016-1329" }, { "db": "CNNVD", "id": "CNNVD-201603-011" } ] }, "id": "VAR-201603-0033", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-01458" }, { "db": "VULHUB", "id": "VHN-90148" } ], "trust": 1.6166666666666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01458" } ] }, "last_update_date": "2023-12-18T13:19:45.571000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160302-n3k", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160302-n3k" }, { "title": "Patch for Cisco Nexus 3000/3500 Switch Default Credential Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/72206" }, { "title": "Cisco Nexus 3000 Series Switches and Cisco Nexus 3500 Platform Switches NX-OS Software Fixes for permission permissions and access control vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60376" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2016/03/03/cisco_stitches_default_root_creds_for_switches/" }, { "title": "Cisco: Cisco Nexus 3000 Series and 3500 Platform Switches Insecure Default Credentials Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20160302-n3k" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01458" }, { "db": "VULMON", "id": "CVE-2016-1329" }, { "db": "JVNDB", "id": "JVNDB-2016-001817" }, { "db": "CNNVD", "id": "CNNVD-201603-011" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90148" }, { "db": "JVNDB", "id": "JVNDB-2016-001817" }, { "db": "NVD", "id": "CVE-2016-1329" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160302-n3k" }, { "trust": 1.8, "url": "https://isc.sans.edu/forums/diary/20795" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1035161" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1329" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1329" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/83945" }, { "trust": 0.1, "url": "https://www.theregister.co.uk/2016/03/03/cisco_stitches_default_root_creds_for_switches/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01458" }, { "db": "VULHUB", "id": "VHN-90148" }, { "db": "VULMON", "id": "CVE-2016-1329" }, { "db": "JVNDB", "id": "JVNDB-2016-001817" }, { "db": "NVD", "id": "CVE-2016-1329" }, { "db": "CNNVD", "id": "CNNVD-201603-011" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-01458" }, { "db": "VULHUB", "id": "VHN-90148" }, { "db": "VULMON", "id": "CVE-2016-1329" }, { "db": "JVNDB", "id": "JVNDB-2016-001817" }, { "db": "NVD", "id": "CVE-2016-1329" }, { "db": "CNNVD", "id": "CNNVD-201603-011" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-03-07T00:00:00", "db": "CNVD", "id": "CNVD-2016-01458" }, { "date": "2016-03-03T00:00:00", "db": "VULHUB", "id": "VHN-90148" }, { "date": "2016-03-03T00:00:00", "db": "VULMON", "id": "CVE-2016-1329" }, { "date": "2016-03-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001817" }, { "date": "2016-03-03T11:59:00.117000", "db": "NVD", "id": "CVE-2016-1329" }, { "date": "2016-03-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201603-011" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-03-08T00:00:00", "db": "CNVD", "id": "CNVD-2016-01458" }, { "date": "2016-12-03T00:00:00", "db": "VULHUB", "id": "VHN-90148" }, { "date": "2016-12-03T00:00:00", "db": "VULMON", "id": "CVE-2016-1329" }, { "date": "2016-03-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001817" }, { "date": "2016-12-03T03:20:26.577000", "db": "NVD", "id": "CVE-2016-1329" }, { "date": "2016-03-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201603-011" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201603-011" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Nexus 3000 and Nexus 3500 Run on device Cisco NX-OS In root Privileged vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001817" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201603-011" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.