var-201904-0648
Vulnerability from variot
A vulnerability in the administrative GUI configuration feature of Cisco Wireless LAN Controller (WLC) Software could allow an aUTHENTICated, remote attacker to cause the device to reload unexpectedly during device configuration when the administrator is using this GUI, causing a denial of service (DoS) condition on an affected device. The attacker would need to have valid administrator credentials on the device. This vulnerability is due to incomplete input validation for unexpected configuration options that the attacker could submit while accessing the GUI configuration menus. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted user input when using the administrative GUI configuration feature. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Software versions prior to 8.3.150.0, 8.5.140.0, 8.8.111.0 are affected by this vulnerability. Cisco Wireless LAN Controller (WLC) The software contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco Wireless LAN Controller is prone to multiple denial-of-service vulnerabilities. These issues are being tracked by Cisco Bug IDs CSCvb35683, CSCvd64417, CSCve58704, CSCve68131, CSCve82306, CSCve88013, CSCve90361, CSCve90365, CSCve91536, CSCve91601, CSCve92619, CSCve93039, CSCve93215, CSCve93547, CSCve94030, CSCve94052, CSCve94683, CSCve94821, CSCve94942, CSCve95046, CSCve95104, CSCve95848, CSCve95866, CSCve95898, CSCve95987, CSCve96534, CSCve96615, CSCve96858, CSCve96879, CSCve97734, CSCve97771, CSCve98357, CSCve98393, CSCve98434, CSCve99020, CSCve99072, CSCve99212, CSCve99744, CSCvf01690, CSCvf02412, CSCvf06525, CSCvf08015, CSCvf15789, CSCvf16237, CSCvf16322, CSCvf16358, CSCvf20684, CSCvf27133, CSCvf27342, CSCvf42722, CSCvf47085, CSCvf47220, CSCvf47430, CSCvf47934, CSCvf54469, CSCvf57639, CSCvf58849, CSCvf59210, CSCvf59796, and CSCvf59799. Cisco WLC Software releases prior to 8.3.150.0, releases prior to 8.5.140.0, and releases prior to 8.8.111.0 have an input validation error vulnerability in the management GUI configuration function, which is caused by the network system or product not properly validating the entered data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201904-0648", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wireless lan controller software", "scope": "lt", "trust": 1.8, "vendor": "cisco", "version": "8.3.150.0" }, { "model": "wireless lan controller software", "scope": "lt", "trust": 1.8, "vendor": "cisco", "version": "8.5.140.0" }, { "model": "wireless lan controller software", "scope": "lt", "trust": 1.8, "vendor": "cisco", "version": "8.8.111.0" }, { "model": "wireless lan controller software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "8.6" }, { "model": "wireless lan controller software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "8.4" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6.101" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5.110" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.143" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.140" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.8" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7.106.0" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7.102.0" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5.105.0" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.111.0" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.102.0" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.141.0" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.130.0" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.140.0" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.100" }, { "model": "wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.140" }, { "model": "wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.164.0" }, { "model": "wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.121.0" }, { "model": "wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.131.0" }, { "model": "wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.104.37" }, { "model": "wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.140.0" }, { "model": "wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.132.0" }, { "model": "wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.120.0" }, { "model": "wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.100.0" }, { "model": "series wireless controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "55000" }, { "model": "wireless lan controller software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.8.120.0" }, { "model": "wireless lan controller software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.8.111.0" }, { "model": "wireless lan controller software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.5.140.0" }, { "model": "wireless lan controller software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.3.150.0" } ], "sources": [ { "db": "BID", "id": "108009" }, { "db": "JVNDB", "id": "JVNDB-2019-003588" }, { "db": "NVD", "id": "CVE-2018-0248" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.3.150.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.5.140.0", "versionStartIncluding": "8.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.8.111.0", "versionStartIncluding": "8.6", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0248" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "108009" }, { "db": "CNNVD", "id": "CNNVD-201904-857" } ], "trust": 0.9 }, "cve": "CVE-2018-0248", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 6.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-0248", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-118450", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.3, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 4.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-0248", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0248", "trust": 1.8, "value": "MEDIUM" }, { "author": "ykramarz@cisco.com", "id": "CVE-2018-0248", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201904-857", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-118450", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-118450" }, { "db": "JVNDB", "id": "JVNDB-2019-003588" }, { "db": "NVD", "id": "CVE-2018-0248" }, { "db": "NVD", "id": "CVE-2018-0248" }, { "db": "CNNVD", "id": "CNNVD-201904-857" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the administrative GUI configuration feature of Cisco Wireless LAN Controller (WLC) Software could allow an aUTHENTICated, remote attacker to cause the device to reload unexpectedly during device configuration when the administrator is using this GUI, causing a denial of service (DoS) condition on an affected device. The attacker would need to have valid administrator credentials on the device. This vulnerability is due to incomplete input validation for unexpected configuration options that the attacker could submit while accessing the GUI configuration menus. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted user input when using the administrative GUI configuration feature. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Software versions prior to 8.3.150.0, 8.5.140.0, 8.8.111.0 are affected by this vulnerability. Cisco Wireless LAN Controller (WLC) The software contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco Wireless LAN Controller is prone to multiple denial-of-service vulnerabilities. \nThese issues are being tracked by Cisco Bug IDs CSCvb35683, CSCvd64417, CSCve58704, CSCve68131, CSCve82306, CSCve88013, CSCve90361, CSCve90365, CSCve91536, CSCve91601, CSCve92619, CSCve93039, CSCve93215, CSCve93547, CSCve94030, CSCve94052, CSCve94683, CSCve94821, CSCve94942, CSCve95046, CSCve95104, CSCve95848, CSCve95866, CSCve95898, CSCve95987, CSCve96534, CSCve96615, CSCve96858, CSCve96879, CSCve97734, CSCve97771, CSCve98357, CSCve98393, CSCve98434, CSCve99020, CSCve99072, CSCve99212, CSCve99744, CSCvf01690, CSCvf02412, CSCvf06525, CSCvf08015, CSCvf15789, CSCvf16237, CSCvf16322, CSCvf16358, CSCvf20684, CSCvf27133, CSCvf27342, CSCvf42722, CSCvf47085, CSCvf47220, CSCvf47430, CSCvf47934, CSCvf54469, CSCvf57639, CSCvf58849, CSCvf59210, CSCvf59796, and CSCvf59799. Cisco WLC Software releases prior to 8.3.150.0, releases prior to 8.5.140.0, and releases prior to 8.8.111.0 have an input validation error vulnerability in the management GUI configuration function, which is caused by the network system or product not properly validating the entered data", "sources": [ { "db": "NVD", "id": "CVE-2018-0248" }, { "db": "JVNDB", "id": "JVNDB-2019-003588" }, { "db": "BID", "id": "108009" }, { "db": "VULHUB", "id": "VHN-118450" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0248", "trust": 2.8 }, { "db": "BID", "id": "108009", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2019-003588", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201904-857", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.1333", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118450", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118450" }, { "db": "BID", "id": "108009" }, { "db": "JVNDB", "id": "JVNDB-2019-003588" }, { "db": "NVD", "id": "CVE-2018-0248" }, { "db": "CNNVD", "id": "CNNVD-201904-857" } ] }, "id": "VAR-201904-0648", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-118450" } ], "trust": 0.6126263 }, "last_update_date": "2023-12-18T12:00:21.900000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20190417-wlc-gui", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190417-wlc-gui" }, { "title": "Cisco Wireless LAN Controller Software Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=91691" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003588" }, { "db": "CNNVD", "id": "CNNVD-201904-857" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118450" }, { "db": "JVNDB", "id": "JVNDB-2019-003588" }, { "db": "NVD", "id": "CVE-2018-0248" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/108009" }, { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190417-wlc-gui" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0248" }, { "trust": 0.9, "url": "http://www.cisco.com/en/us/products/ps6302/products_sub_category_home.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0248" }, { "trust": 0.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190417-wlc-cert-dos" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/79298" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-wireless-lan-controller-denial-of-service-via-gui-configuration-29091" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-118450" }, { "db": "BID", "id": "108009" }, { "db": "JVNDB", "id": "JVNDB-2019-003588" }, { "db": "NVD", "id": "CVE-2018-0248" }, { "db": "CNNVD", "id": "CNNVD-201904-857" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-118450" }, { "db": "BID", "id": "108009" }, { "db": "JVNDB", "id": "JVNDB-2019-003588" }, { "db": "NVD", "id": "CVE-2018-0248" }, { "db": "CNNVD", "id": "CNNVD-201904-857" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-04-17T00:00:00", "db": "VULHUB", "id": "VHN-118450" }, { "date": "2019-04-17T00:00:00", "db": "BID", "id": "108009" }, { "date": "2019-05-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003588" }, { "date": "2019-04-17T22:29:00.217000", "db": "NVD", "id": "CVE-2018-0248" }, { "date": "2019-04-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-857" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118450" }, { "date": "2019-04-17T00:00:00", "db": "BID", "id": "108009" }, { "date": "2019-05-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003588" }, { "date": "2019-10-09T23:31:34.177000", "db": "NVD", "id": "CVE-2018-0248" }, { "date": "2019-04-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-857" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-857" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Wireless LAN Controller Software input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003588" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "108009" }, { "db": "CNNVD", "id": "CNNVD-201904-857" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.