var-201604-0565
Vulnerability from variot
Cisco FireSIGHT System Software 5.4.0 through 6.0.1 and ASA with FirePOWER Services 5.4.0 through 6.0.0.1 allow remote attackers to bypass malware protection via crafted fields in HTTP headers, aka Bug ID CSCux22726. An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. This issue is tracked by Cisco Bug ID CSCux22726. A remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to bypass malicious file detection or blocking policies. The following devices and versions are affected: Cisco Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services Version 5.4.0 to Version 6.0.0.1, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, FirePOWER Threat Defense for Integrated Services Routers(ISRs), Next Generation Intrusion Prevention System (NGIPS) for Blue Coat X-Series, Sourcefire Next 3D System Appliances, Virt -Generation Intrusion Prevention System (NGIPSv) for VMware
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201604-0565", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asa with firepower services", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.4.0.3" }, { "model": "asa with firepower services", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.4.0" }, { "model": "asa with firepower services", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.4.0.4" }, { "model": "asa with firepower services", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.4.0.5" }, { "model": "asa with firepower services", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.4.0.1" }, { "model": "firesight system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.4.0.6" }, { "model": "asa with firepower services", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0.0" }, { "model": "asa with firepower services", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.4.0.6" }, { "model": "firesight system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0.0.1" }, { "model": "asa with firepower services", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.4.0.2" }, { "model": "firesight system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4.0" }, { "model": "firesight system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4.0.4" }, { "model": "firesight system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4.1.2" }, { "model": "firesight system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4.0.5" }, { "model": "firesight system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0.1" }, { "model": "firesight system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4.0.1" }, { "model": "firesight system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0.0" }, { "model": "firesight system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4.0.2" }, { "model": "firesight system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4.1.3" }, { "model": "firesight system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4.1.4" }, { "model": "firesight system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4.1" }, { "model": "asa with firepower services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0.0.1" }, { "model": "firesight system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4.0.3" }, { "model": "asa with firepower services", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "5.4.0 to 6.0.0.1" }, { "model": "firesight system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "5.4.0 to 6.0.1" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001931" }, { "db": "NVD", "id": "CVE-2016-1345" }, { "db": "CNNVD", "id": "CNNVD-201603-428" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:6.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:6.0.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:6.0.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:6.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:6.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-1345" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This vulnerability was found and reported to Cisco by Dikla Barda, Liad Mizrachi, and Oded Vanunu from Check Point Security Team.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201603-428" } ], "trust": 0.6 }, "cve": "CVE-2016-1345", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1345", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-90164", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1345", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-1345", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201603-428", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-90164", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-90164" }, { "db": "JVNDB", "id": "JVNDB-2016-001931" }, { "db": "NVD", "id": "CVE-2016-1345" }, { "db": "CNNVD", "id": "CNNVD-201603-428" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco FireSIGHT System Software 5.4.0 through 6.0.1 and ASA with FirePOWER Services 5.4.0 through 6.0.0.1 allow remote attackers to bypass malware protection via crafted fields in HTTP headers, aka Bug ID CSCux22726. \nAn attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. \nThis issue is tracked by Cisco Bug ID CSCux22726. A remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to bypass malicious file detection or blocking policies. The following devices and versions are affected: Cisco Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services Version 5.4.0 to Version 6.0.0.1, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, FirePOWER Threat Defense for Integrated Services Routers(ISRs), Next Generation Intrusion Prevention System (NGIPS) for Blue Coat X-Series, Sourcefire Next 3D System Appliances, Virt -Generation Intrusion Prevention System (NGIPSv) for VMware", "sources": [ { "db": "NVD", "id": "CVE-2016-1345" }, { "db": "JVNDB", "id": "JVNDB-2016-001931" }, { "db": "BID", "id": "85749" }, { "db": "VULHUB", "id": "VHN-90164" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1345", "trust": 2.8 }, { "db": "SECTRACK", "id": "1035438", "trust": 1.1 }, { "db": "SECTRACK", "id": "1035437", "trust": 1.1 }, { "db": "SECTRACK", "id": "1035439", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-001931", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201603-428", "trust": 0.7 }, { "db": "BID", "id": "85749", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-90164", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90164" }, { "db": "BID", "id": "85749" }, { "db": "JVNDB", "id": "JVNDB-2016-001931" }, { "db": "NVD", "id": "CVE-2016-1345" }, { "db": "CNNVD", "id": "CNNVD-201603-428" } ] }, "id": "VAR-201604-0565", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-90164" } ], "trust": 0.6714285999999999 }, "last_update_date": "2023-12-18T13:39:11.266000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160330-fp", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160330-fp" }, { "title": "cisco-sa-20160330-fp", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/113/1136/1136613_cisco-sa-20160330-fp-j.html" }, { "title": "Cisco Firepower System Software Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60722" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001931" }, { "db": "CNNVD", "id": "CNNVD-201603-428" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90164" }, { "db": "JVNDB", "id": "JVNDB-2016-001931" }, { "db": "NVD", "id": "CVE-2016-1345" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160330-fp" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035437" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035438" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035439" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1345" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1345" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-90164" }, { "db": "BID", "id": "85749" }, { "db": "JVNDB", "id": "JVNDB-2016-001931" }, { "db": "NVD", "id": "CVE-2016-1345" }, { "db": "CNNVD", "id": "CNNVD-201603-428" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-90164" }, { "db": "BID", "id": "85749" }, { "db": "JVNDB", "id": "JVNDB-2016-001931" }, { "db": "NVD", "id": "CVE-2016-1345" }, { "db": "CNNVD", "id": "CNNVD-201603-428" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-01T00:00:00", "db": "VULHUB", "id": "VHN-90164" }, { "date": "2016-03-30T00:00:00", "db": "BID", "id": "85749" }, { "date": "2016-04-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001931" }, { "date": "2016-04-01T00:59:00.113000", "db": "NVD", "id": "CVE-2016-1345" }, { "date": "2016-03-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201603-428" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-03T00:00:00", "db": "VULHUB", "id": "VHN-90164" }, { "date": "2016-07-06T14:18:00", "db": "BID", "id": "85749" }, { "date": "2016-04-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001931" }, { "date": "2016-12-03T03:20:28.810000", "db": "NVD", "id": "CVE-2016-1345" }, { "date": "2016-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201603-428" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201603-428" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco FireSIGHT system Software and ASA with FirePOWER Services Vulnerabilities that prevent malware protection", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001931" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201603-428" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.