VAR-201604-0565
Vulnerability from variot - Updated: 2023-12-18 13:39Cisco FireSIGHT System Software 5.4.0 through 6.0.1 and ASA with FirePOWER Services 5.4.0 through 6.0.0.1 allow remote attackers to bypass malware protection via crafted fields in HTTP headers, aka Bug ID CSCux22726. An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. This issue is tracked by Cisco Bug ID CSCux22726. A remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to bypass malicious file detection or blocking policies. The following devices and versions are affected: Cisco Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services Version 5.4.0 to Version 6.0.0.1, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, FirePOWER Threat Defense for Integrated Services Routers(ISRs), Next Generation Intrusion Prevention System (NGIPS) for Blue Coat X-Series, Sourcefire Next 3D System Appliances, Virt -Generation Intrusion Prevention System (NGIPSv) for VMware
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201604-0565",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "asa with firepower services",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.0.3"
},
{
"model": "asa with firepower services",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.0"
},
{
"model": "asa with firepower services",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.0.4"
},
{
"model": "asa with firepower services",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.0.5"
},
{
"model": "asa with firepower services",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.0.1"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.0.6"
},
{
"model": "asa with firepower services",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0.0"
},
{
"model": "asa with firepower services",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.0.6"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0.0.1"
},
{
"model": "asa with firepower services",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.0.2"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.4.0"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.4.0.4"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.4.1.2"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.4.0.5"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0.1"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.4.0.1"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0.0"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.4.0.2"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.4.1.3"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.4.1.4"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.4.1"
},
{
"model": "asa with firepower services",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0.0.1"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.4.0.3"
},
{
"model": "asa with firepower services",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.0 to 6.0.0.1"
},
{
"model": "firesight system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.0 to 6.0.1"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-001931"
},
{
"db": "NVD",
"id": "CVE-2016-1345"
},
{
"db": "CNNVD",
"id": "CNNVD-201603-428"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:6.0.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:6.0.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:6.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:6.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firesight_system_software:5.4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-1345"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "This vulnerability was found and reported to Cisco by Dikla Barda, Liad Mizrachi, and Oded Vanunu from Check Point Security Team.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201603-428"
}
],
"trust": 0.6
},
"cve": "CVE-2016-1345",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-1345",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-90164",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-1345",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-1345",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201603-428",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-90164",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-90164"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001931"
},
{
"db": "NVD",
"id": "CVE-2016-1345"
},
{
"db": "CNNVD",
"id": "CNNVD-201603-428"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco FireSIGHT System Software 5.4.0 through 6.0.1 and ASA with FirePOWER Services 5.4.0 through 6.0.0.1 allow remote attackers to bypass malware protection via crafted fields in HTTP headers, aka Bug ID CSCux22726. \nAn attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. \nThis issue is tracked by Cisco Bug ID CSCux22726. A remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to bypass malicious file detection or blocking policies. The following devices and versions are affected: Cisco Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services Version 5.4.0 to Version 6.0.0.1, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, FirePOWER Threat Defense for Integrated Services Routers(ISRs), Next Generation Intrusion Prevention System (NGIPS) for Blue Coat X-Series, Sourcefire Next 3D System Appliances, Virt -Generation Intrusion Prevention System (NGIPSv) for VMware",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-1345"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001931"
},
{
"db": "BID",
"id": "85749"
},
{
"db": "VULHUB",
"id": "VHN-90164"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-1345",
"trust": 2.8
},
{
"db": "SECTRACK",
"id": "1035438",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1035437",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1035439",
"trust": 1.1
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001931",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201603-428",
"trust": 0.7
},
{
"db": "BID",
"id": "85749",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-90164",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-90164"
},
{
"db": "BID",
"id": "85749"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001931"
},
{
"db": "NVD",
"id": "CVE-2016-1345"
},
{
"db": "CNNVD",
"id": "CNNVD-201603-428"
}
]
},
"id": "VAR-201604-0565",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-90164"
}
],
"trust": 0.6714285999999999
},
"last_update_date": "2023-12-18T13:39:11.266000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20160330-fp",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160330-fp"
},
{
"title": "cisco-sa-20160330-fp",
"trust": 0.8,
"url": "http://www.cisco.com/cisco/web/support/jp/113/1136/1136613_cisco-sa-20160330-fp-j.html"
},
{
"title": "Cisco Firepower System Software Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60722"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-001931"
},
{
"db": "CNNVD",
"id": "CNNVD-201603-428"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-90164"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001931"
},
{
"db": "NVD",
"id": "CVE-2016-1345"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160330-fp"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1035437"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1035438"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1035439"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1345"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1345"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-90164"
},
{
"db": "BID",
"id": "85749"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001931"
},
{
"db": "NVD",
"id": "CVE-2016-1345"
},
{
"db": "CNNVD",
"id": "CNNVD-201603-428"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-90164"
},
{
"db": "BID",
"id": "85749"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001931"
},
{
"db": "NVD",
"id": "CVE-2016-1345"
},
{
"db": "CNNVD",
"id": "CNNVD-201603-428"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-01T00:00:00",
"db": "VULHUB",
"id": "VHN-90164"
},
{
"date": "2016-03-30T00:00:00",
"db": "BID",
"id": "85749"
},
{
"date": "2016-04-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-001931"
},
{
"date": "2016-04-01T00:59:00.113000",
"db": "NVD",
"id": "CVE-2016-1345"
},
{
"date": "2016-03-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201603-428"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-03T00:00:00",
"db": "VULHUB",
"id": "VHN-90164"
},
{
"date": "2016-07-06T14:18:00",
"db": "BID",
"id": "85749"
},
{
"date": "2016-04-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-001931"
},
{
"date": "2016-12-03T03:20:28.810000",
"db": "NVD",
"id": "CVE-2016-1345"
},
{
"date": "2016-04-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201603-428"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201603-428"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco FireSIGHT system Software and ASA with FirePOWER Services Vulnerabilities that prevent malware protection",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-001931"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201603-428"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.