var-201605-0553
Vulnerability from variot
The gadgets-integration API in Cisco Finesse 8.5(1) through 8.5(5), 8.6(1), 9.0(1), 9.0(2), 9.1(1), 9.1(1)SU1, 9.1(1)SU1.1, 9.1(1)ES1 through 9.1(1)ES5, 10.0(1), 10.0(1)SU1, 10.0(1)SU1.1, 10.5(1), 10.5(1)ES1 through 10.5(1)ES4, 10.5(1)SU1, 10.5(1)SU1.1, 10.5(1)SU1.7, 10.6(1), 10.6(1)SU1, 10.6(1)SU2, and 11.0(1) allows remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted request, aka Bug ID CSCuw86623. Vendors have confirmed this vulnerability Bug ID CSCuw86623 It is released as. Supplementary information : CWE Vulnerability type by CWE-918: Server-Side Request Forgery (SSRF) ( Server-side request forgery ) Has been identified. Cisco Finesse is prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. The software improves call center service quality, improves customer experience, and increases agent satisfaction. The vulnerability stems from the program not adequately restricting access to the gadgets-integration API. The following releases are affected: Cisco Finesse Release 8.5(1) through Release 8.5(5), Release 8.6(1), Release 9.0(1), Release 9.0(2), Release 9.1(1) through Release 9.1(1)SU1.1 Versions, 9.1(1)ES1 to 9.1(1)ES5, 10.0(1) to 10.0(1)SU1.1, 10.5(1), 10.5(1)ES1 to 10.5(1)ES4 , 10.5(1)SU1 release, 10.5(1)SU1.1 release, 10.5(1)SU1.7 release, 10.6(1) release, 10.6(1)SU1 release, 10.6(1)SU2 release, 11.0(1) Version
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0553", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "finesse", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1\\(1\\)_es3" }, { "model": "finesse", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1\\(1\\)_su1" }, { "model": "finesse", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1\\(1\\)_su1.1" }, { "model": "finesse", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1\\(1\\)_es4" }, { "model": "finesse", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1\\(1\\)_es1" }, { "model": "finesse", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1\\(1\\)_es2" }, { "model": "finesse", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0\\(1\\)_su1.1" }, { "model": "finesse", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.5\\(1\\)_base" }, { "model": "finesse", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1\\(1\\)_es5" }, { "model": "finesse", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0\\(1\\)_su1" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0\\(1\\)_base" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0\\(2\\)_base" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(2\\)_base" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(1\\)_base" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.5\\(1\\)_es4" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.5\\(1\\)_su1.1" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.5\\(1\\)_su1.7" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.6\\(1\\)_base" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(5\\)_base" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.0\\(1\\)_base" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6\\(1\\)_base" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.0\\(1\\)_base" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.6\\(1\\)_su2" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(4\\)_base" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1\\(1\\)_base" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.5\\(1\\)_es1" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.5\\(1\\)_es3" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(3\\)_base" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.6\\(1\\)_su1" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.5\\(1\\)_su1" }, { "model": "finesse", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.5\\(1\\)_es2" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.0(1)" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.0(1)su1" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.0(1)su1.1" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.5(1)" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.5(1)es1 to 10.5(1)es4" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.5(1)su1" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.5(1)su1.1" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.5(1)su1.7" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.6(1)" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.6(1)su1" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.6(1)su2" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "11.0(1)" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.5(1) to 8.5(5)" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.6(1)" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.0(1)" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.0(2)" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1(1)" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1(1)es1 to 9.1(1)es5" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1(1)su1" }, { "model": "finesse", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1(1)su1.1" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002713" }, { "db": "NVD", "id": "CVE-2016-1373" }, { "db": "CNNVD", "id": "CNNVD-201605-111" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:finesse:9.1\\(1\\)_es2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:9.1\\(1\\)_es3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:8.5\\(2\\)_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:8.5\\(3\\)_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:10.6\\(1\\)_su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:10.6\\(1\\)_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:10.5\\(1\\)_su1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:10.5\\(1\\)_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:10.0\\(1\\)_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:9.1\\(1\\)_es1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:9.0\\(1\\)_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:8.5\\(1\\)_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:11.0\\(1\\)_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:10.6\\(1\\)_su2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:10.5\\(1\\)_su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:10.5\\(1\\)_su1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:9.1\\(1\\)_es4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:9.1\\(1\\)_es5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:9.1\\(1\\)_su1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:8.5\\(4\\)_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:8.5\\(5\\)_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:10.5\\(1\\)_es1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:10.5\\(1\\)_es2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:10.0\\(1\\)_su1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:10.0\\(1\\)_su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:9.1\\(1\\)_su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:9.1\\(1\\)_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:8.6\\(1\\)_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:9.0\\(2\\)_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:10.5\\(1\\)_es3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:finesse:10.5\\(1\\)_es4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-1373" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juliano Rizzo", "sources": [ { "db": "BID", "id": "90006" }, { "db": "CNNVD", "id": "CNNVD-201605-111" } ], "trust": 0.9 }, "cve": "CVE-2016-1373", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1373", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-90192", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 4.0, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 8.6, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1373", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-1373", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201605-111", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-90192", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-90192" }, { "db": "JVNDB", "id": "JVNDB-2016-002713" }, { "db": "NVD", "id": "CVE-2016-1373" }, { "db": "CNNVD", "id": "CNNVD-201605-111" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The gadgets-integration API in Cisco Finesse 8.5(1) through 8.5(5), 8.6(1), 9.0(1), 9.0(2), 9.1(1), 9.1(1)SU1, 9.1(1)SU1.1, 9.1(1)ES1 through 9.1(1)ES5, 10.0(1), 10.0(1)SU1, 10.0(1)SU1.1, 10.5(1), 10.5(1)ES1 through 10.5(1)ES4, 10.5(1)SU1, 10.5(1)SU1.1, 10.5(1)SU1.7, 10.6(1), 10.6(1)SU1, 10.6(1)SU2, and 11.0(1) allows remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted request, aka Bug ID CSCuw86623. Vendors have confirmed this vulnerability Bug ID CSCuw86623 It is released as. Supplementary information : CWE Vulnerability type by CWE-918: Server-Side Request Forgery (SSRF) ( Server-side request forgery ) Has been identified. Cisco Finesse is prone to a security-bypass vulnerability. \nAttackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. The software improves call center service quality, improves customer experience, and increases agent satisfaction. The vulnerability stems from the program not adequately restricting access to the gadgets-integration API. The following releases are affected: Cisco Finesse Release 8.5(1) through Release 8.5(5), Release 8.6(1), Release 9.0(1), Release 9.0(2), Release 9.1(1) through Release 9.1(1)SU1.1 Versions, 9.1(1)ES1 to 9.1(1)ES5, 10.0(1) to 10.0(1)SU1.1, 10.5(1), 10.5(1)ES1 to 10.5(1)ES4 , 10.5(1)SU1 release, 10.5(1)SU1.1 release, 10.5(1)SU1.7 release, 10.6(1) release, 10.6(1)SU1 release, 10.6(1)SU2 release, 11.0(1) Version", "sources": [ { "db": "NVD", "id": "CVE-2016-1373" }, { "db": "JVNDB", "id": "JVNDB-2016-002713" }, { "db": "BID", "id": "90006" }, { "db": "VULHUB", "id": "VHN-90192" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1373", "trust": 2.8 }, { "db": "SECTRACK", "id": "1035756", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-002713", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201605-111", "trust": 0.7 }, { "db": "BID", "id": "90006", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-90192", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90192" }, { "db": "BID", "id": "90006" }, { "db": "JVNDB", "id": "JVNDB-2016-002713" }, { "db": "NVD", "id": "CVE-2016-1373" }, { "db": "CNNVD", "id": "CNNVD-201605-111" } ] }, "id": "VAR-201605-0553", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-90192" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:05:57.386000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160504-finesse", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160504-finesse" }, { "title": "Cisco Finesse Remedial measures for server-side request forgery vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=61434" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002713" }, { "db": "CNNVD", "id": "CNNVD-201605-111" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002713" }, { "db": "NVD", "id": "CVE-2016-1373" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160504-finesse" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035756" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1373" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1373" }, { "trust": 0.3, "url": "http://www.cisco.com" } ], "sources": [ { "db": "VULHUB", "id": "VHN-90192" }, { "db": "BID", "id": "90006" }, { "db": "JVNDB", "id": "JVNDB-2016-002713" }, { "db": "NVD", "id": "CVE-2016-1373" }, { "db": "CNNVD", "id": "CNNVD-201605-111" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-90192" }, { "db": "BID", "id": "90006" }, { "db": "JVNDB", "id": "JVNDB-2016-002713" }, { "db": "NVD", "id": "CVE-2016-1373" }, { "db": "CNNVD", "id": "CNNVD-201605-111" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-05T00:00:00", "db": "VULHUB", "id": "VHN-90192" }, { "date": "2016-05-04T00:00:00", "db": "BID", "id": "90006" }, { "date": "2016-05-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002713" }, { "date": "2016-05-05T21:59:03.267000", "db": "NVD", "id": "CVE-2016-1373" }, { "date": "2016-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-111" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-01T00:00:00", "db": "VULHUB", "id": "VHN-90192" }, { "date": "2016-07-06T14:36:00", "db": "BID", "id": "90006" }, { "date": "2016-05-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002713" }, { "date": "2016-12-01T03:05:23.070000", "db": "NVD", "id": "CVE-2016-1373" }, { "date": "2016-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-111" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-111" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Finesse Gadget integration API Server-side request forgery vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002713" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-111" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.