mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 19:17:10 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
fb72b077d8
commit
e89602c717
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to bypass access controls and conduct an SSRF attack through an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected system."
|
||||
"value": "A vulnerability in Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to bypass access controls and conduct an SSRF attack through an affected device.\r\n\r This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected system."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -21,7 +21,8 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Server-Side Request Forgery (SSRF)",
|
||||
"cweId": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -39,32 +40,32 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "RoomOS 10.3.2.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.3.2.0"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.3.4.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.3.4.0"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.8.2.5",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.8.2.5"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.11.5.2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.11.5.2"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.8.4.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.8.4.0"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.11.3.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.11.3.0"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.15.3.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.15.3.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -74,160 +75,168 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "CE8.1.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.0.1"
|
||||
},
|
||||
{
|
||||
"version_value": "CE8.3.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.1.1"
|
||||
},
|
||||
{
|
||||
"version_value": "CE8.3.5",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.1.2"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.0.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.1.3"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.1.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.1.4"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.1.2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.1.5"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.1.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.1.6"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.1.4",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.10.1"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.1.5",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.10.2"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.1.6",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.10.3"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.10.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.12.4"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.10.2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.12.5"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.10.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.12.3"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.12.4",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.13.0"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.12.5",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.13.1"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.12.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.13.3"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.13.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.13.2"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.13.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.2.1"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.13.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.2.2"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.13.2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.2.3"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.2.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.2.4"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.2.2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.9.3"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.2.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.9.4"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.2.4",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.14.3"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.9.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.14.5"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.9.4",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.14.4"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.14.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.14.6"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.14.5",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.14.7"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.14.4",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.0.11"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.14.6",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.0.10"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.15.0.11",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.10.8"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.15.0.10",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.3.26"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.15.10.8",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.3.25"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.15.3.26",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.3.17"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.15.3.25",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.3.22"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.8.4.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.0.19"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.11.3.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.8.4.0"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.11.5.2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.11.3.0"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.15.3.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.11.5.2"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.15.3.0"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "9.15.3.25"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -21,7 +21,8 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
|
||||
"cweId": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -21,7 +21,8 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Incorrect Conversion between Numeric Types",
|
||||
"cweId": "CWE-681"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code or cause the web-based management process on the device to restart unexpectedly, resulting in a denial of service (DoS) condition. The attacker must have valid administrator credentials. This vulnerability is due to insufficient validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the web-based management process to restart, resulting in a DoS condition."
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code or cause the web-based management process on the device to restart unexpectedly, resulting in a denial of service (DoS) condition. The attacker must have valid administrator credentials. \r\n\r This vulnerability is due to insufficient validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the web-based management process to restart, resulting in a DoS condition."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -21,7 +21,8 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
|
||||
"cweId": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -39,80 +40,80 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "1.0.00.29",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.00.29"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.00.33",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.00.33"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.01.16",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.01.16"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.01.17",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.01.17"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.01.18",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.01.18"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.01.20",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.01.20"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.02.16",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.02.16"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.03.15",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.15"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.03.16",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.16"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.03.17",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.17"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.03.18",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.18"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.03.19",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.19"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.03.20",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.20"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.03.21",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.21"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.03.22",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.22"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.03.24",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.24"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.03.26",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.26"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.03.27",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.27"
|
||||
},
|
||||
{
|
||||
"version_value": "1.0.03.28",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.28"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in the CLI of Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to overwrite arbitrary files on the local system of an affected device. This vulnerability is due to improper access controls on files that are in the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device."
|
||||
"value": "A vulnerability in the CLI of Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to overwrite arbitrary files on the local system of an affected device.\r\n\r This vulnerability is due to improper access controls on files that are in the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -21,7 +21,8 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Improper Link Resolution Before File Access ('Link Following')",
|
||||
"cweId": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -39,32 +40,32 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "RoomOS 10.3.2.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.3.2.0"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.3.4.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.3.4.0"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.8.2.5",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.8.2.5"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.11.5.2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.11.5.2"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.8.4.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.8.4.0"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.11.3.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.11.3.0"
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.15.3.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.15.3.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -74,232 +75,180 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "CE8.0.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.0.1"
|
||||
},
|
||||
{
|
||||
"version_value": "CE8.0.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.1.1"
|
||||
},
|
||||
{
|
||||
"version_value": "CE8.1.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.1.2"
|
||||
},
|
||||
{
|
||||
"version_value": "CE8.1.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.1.3"
|
||||
},
|
||||
{
|
||||
"version_value": "CE8.2.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.1.4"
|
||||
},
|
||||
{
|
||||
"version_value": "CE8.2.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.1.5"
|
||||
},
|
||||
{
|
||||
"version_value": "CE8.2.2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.1.6"
|
||||
},
|
||||
{
|
||||
"version_value": "CE8.3.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.10.1"
|
||||
},
|
||||
{
|
||||
"version_value": "CE8.3.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.10.2"
|
||||
},
|
||||
{
|
||||
"version_value": "CE8.3.2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.10.3"
|
||||
},
|
||||
{
|
||||
"version_value": "CE8.3.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.12.4"
|
||||
},
|
||||
{
|
||||
"version_value": "CE8.3.5",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.12.5"
|
||||
},
|
||||
{
|
||||
"version_value": "CE8.3.6",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.12.3"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.0.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.13.0"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.1.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.13.1"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.1.2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.13.3"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.1.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.13.2"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.1.4",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.2.1"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.1.5",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.2.2"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.1.6",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.2.3"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.10.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.2.4"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.10.2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.9.3"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.10.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.9.4"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.12.4",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.14.3"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.12.5",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.14.5"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.12.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.14.4"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.13.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.14.6"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.13.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.14.7"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.13.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.0.11"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.13.2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.0.10"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.2.1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.8.12"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.2.2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.13.0"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.2.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.10.8"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.2.4",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.3.26"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.9.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.3.25"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.9.4",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.3.17"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.14.3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.3.22"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.14.5",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "CE9.15.0.19"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.14.4",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "TC7.3.21"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.14.6",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.8.4.0"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.15.0.11",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.11.3.0"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.15.0.10",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.11.5.2"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.15.8.12",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "RoomOS 10.15.3.0"
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.15.13.0",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.15.10.8",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.15.3.26",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "CE9.15.3.25",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "TC7.3.13",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "TC7.3.21",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "TC7.3.5",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "TC7.3.6",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "TC7.3.7",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "TC7.3.9",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.8.4.0",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.11.3.0",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.11.5.2",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "RoomOS 10.15.3.0",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "9.15.3.25"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in the Web UI and administrative CLI of the Cisco Secure Email Gateway (ESA) and Cisco Secure Email and Web Manager (SMA) could allow an authenticated remote attacker and or authenticated local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a [[privilege of operator - validate actual name]]. The vulnerability is due to the processing of a specially crafted SNMP configuration file. An attacker could exploit this vulnerability by authenticating to the targeted device and uploading a specially crafted SNMP configuration file that when uploaded could allow for the execution of commands as root. An exploit could allow the attacker to gain root access on the device."
|
||||
"value": "A vulnerability in the Web UI and administrative CLI of the Cisco Secure Email Gateway (ESA) and Cisco Secure Email and Web Manager (SMA) could allow an authenticated remote attacker and or authenticated local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a [[privilege of operator - validate actual name]].\r\n\r The vulnerability is due to the processing of a specially crafted SNMP configuration file. An attacker could exploit this vulnerability by authenticating to the targeted device and uploading a specially crafted SNMP configuration file that when uploaded could allow for the execution of commands as root. An exploit could allow the attacker to gain root access on the device."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -21,7 +21,8 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Improper Input Validation",
|
||||
"cweId": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -35,13 +36,9 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Cisco Email Security Appliance (ESA)",
|
||||
"product_name": "Cisco Secure Email",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "10.0.1-087"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0.3-238"
|
||||
@ -58,14 +55,6 @@
|
||||
"version_affected": "=",
|
||||
"version_value": "11.1.0-128"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "11.1.1-000"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "11.1.2-000"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "12.0.0-419"
|
||||
@ -106,7 +95,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Cisco Content Security Management Appliance (SMA)",
|
||||
"product_name": "Cisco Secure Email and Web Manager",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -117,10 +106,6 @@
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0.1-161"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0.4-000"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "11.5.1-105"
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface inadequately validates user input. An attacker could exploit this vulnerability by authenticating to the application as a low-privileged user and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to read or modify any data on the underlying database or elevate their privileges."
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.\r\n\r This vulnerability exists because the web-based management interface inadequately validates user input. An attacker could exploit this vulnerability by authenticating to the application as a low-privileged user and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to read or modify any data on the underlying database or elevate their privileges."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -21,7 +21,8 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
|
||||
"cweId": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -39,64 +40,64 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "12.0(1)SU1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.0(1)SU1"
|
||||
},
|
||||
{
|
||||
"version_value": "12.0(1)SU2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.0(1)SU2"
|
||||
},
|
||||
{
|
||||
"version_value": "12.0(1)SU3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.0(1)SU3"
|
||||
},
|
||||
{
|
||||
"version_value": "12.0(1)SU4",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.0(1)SU4"
|
||||
},
|
||||
{
|
||||
"version_value": "12.0(1)SU5",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.0(1)SU5"
|
||||
},
|
||||
{
|
||||
"version_value": "12.5(1)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.5(1)"
|
||||
},
|
||||
{
|
||||
"version_value": "12.5(1)SU1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.5(1)SU1"
|
||||
},
|
||||
{
|
||||
"version_value": "12.5(1)SU2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.5(1)SU2"
|
||||
},
|
||||
{
|
||||
"version_value": "12.5(1)SU3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.5(1)SU3"
|
||||
},
|
||||
{
|
||||
"version_value": "12.5(1)SU4",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.5(1)SU4"
|
||||
},
|
||||
{
|
||||
"version_value": "12.5(1)SU5",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.5(1)SU5"
|
||||
},
|
||||
{
|
||||
"version_value": "12.5(1)SU6",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.5(1)SU6"
|
||||
},
|
||||
{
|
||||
"version_value": "14",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "14"
|
||||
},
|
||||
{
|
||||
"version_value": "14SU1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "14SU1"
|
||||
},
|
||||
{
|
||||
"version_value": "14SU2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "14SU2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -21,7 +21,8 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
|
||||
"cweId": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in the DNS functionality of Cisco Nexus Dashboard Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to the improper processing of DNS requests. An attacker could exploit this vulnerability by sending a continuous stream of DNS requests to an affected device. A successful exploit could allow the attacker to cause the coredns service to stop working or cause the device to reload, resulting in a DoS condition."
|
||||
"value": "A vulnerability in the DNS functionality of Cisco Nexus Dashboard Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.\r\n\r This vulnerability is due to the improper processing of DNS requests. An attacker could exploit this vulnerability by sending a continuous stream of DNS requests to an affected device. A successful exploit could allow the attacker to cause the coredns service to stop working or cause the device to reload, resulting in a DoS condition."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -21,7 +21,8 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Resource Management Errors",
|
||||
"cweId": "CWE-399"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -21,7 +21,8 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
|
||||
"cweId": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication."
|
||||
"value": "A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device.\r\n\r This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -21,7 +21,8 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Authentication Bypass Using an Alternate Path or Channel",
|
||||
"cweId": "CWE-288"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -39,308 +40,304 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "9.3(3)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "9.3(4) 3rd Party"
|
||||
},
|
||||
{
|
||||
"version_value": "9.3(4) 3rd Party",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "9.3(4)SR3 3rd Party"
|
||||
},
|
||||
{
|
||||
"version_value": "9.3(4)SR3 3rd Party",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "9.3(4)SR1 3rd Party"
|
||||
},
|
||||
{
|
||||
"version_value": "9.3(4)SR1 3rd Party",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "9.3(4)SR2 3rd Party"
|
||||
},
|
||||
{
|
||||
"version_value": "9.3(4)SR2 3rd Party",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(3)SR3"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(3)SR3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(2)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(2)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.5(1)"
|
||||
},
|
||||
{
|
||||
"version_value": "11.5(1)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(5)SR2"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(5)SR2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(2)"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(2)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.7(1)"
|
||||
},
|
||||
{
|
||||
"version_value": "11.7(1)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(4)SR3"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(4)SR3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(0.7) MPP"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(0.7) MPP",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(4)SR2"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(4)SR2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(3)SR5"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(3)SR5",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(3)SR6"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(3)SR6",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(3)"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(3)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(4)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(4)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(1) MPP"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(1) MPP",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(4)"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(4)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(3)SR4"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(3)SR4",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(5)"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(5)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(3)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(3)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(5)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(5)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(3)SR2"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(3)SR2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(2)SR2"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(2)SR2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(1)"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(1)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.5(1)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "11.5(1)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11-0-1MSR1-1"
|
||||
},
|
||||
{
|
||||
"version_value": "11-0-1MSR1-1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.4(1) 3rd Party"
|
||||
},
|
||||
{
|
||||
"version_value": "10.4(1) 3rd Party",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.3(1.11) 3rd Party"
|
||||
},
|
||||
{
|
||||
"version_value": "10.3(1.11) 3rd Party",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.2(2)"
|
||||
},
|
||||
{
|
||||
"version_value": "10.2(2)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.2(1)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "10.2(1)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.1(1.9)"
|
||||
},
|
||||
{
|
||||
"version_value": "10.1(1.9)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.1(1)SR2"
|
||||
},
|
||||
{
|
||||
"version_value": "10.1(1)SR2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.2(1)"
|
||||
},
|
||||
{
|
||||
"version_value": "10.2(1)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.1(1)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "10.1(1)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.4(1)SR2 3rd Party"
|
||||
},
|
||||
{
|
||||
"version_value": "10.4(1)SR2 3rd Party",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.3(1)"
|
||||
},
|
||||
{
|
||||
"version_value": "10.3(1)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.3(1)SR4b"
|
||||
},
|
||||
{
|
||||
"version_value": "10.3(1)SR4b",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.3(1)SR5"
|
||||
},
|
||||
{
|
||||
"version_value": "10.3(1)SR5",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.3(1.9) 3rd Party"
|
||||
},
|
||||
{
|
||||
"version_value": "10.3(1.9) 3rd Party",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.3(2)"
|
||||
},
|
||||
{
|
||||
"version_value": "10.3(2)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.3(1)SR4"
|
||||
},
|
||||
{
|
||||
"version_value": "10.3(1)SR4",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.3(1)SR2"
|
||||
},
|
||||
{
|
||||
"version_value": "10.3(1)SR2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.3(1)SR3"
|
||||
},
|
||||
{
|
||||
"version_value": "10.3(1)SR3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.3(1)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "10.3(1)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.6(1)"
|
||||
},
|
||||
{
|
||||
"version_value": "12.6(1)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.1(1)"
|
||||
},
|
||||
{
|
||||
"version_value": "12.1(1)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.5(1)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "12.5(1)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.5(1)SR2"
|
||||
},
|
||||
{
|
||||
"version_value": "12.5(1)SR2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.5(1)"
|
||||
},
|
||||
{
|
||||
"version_value": "12.5(1)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.5(1)SR3"
|
||||
},
|
||||
{
|
||||
"version_value": "12.5(1)SR3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.6(1)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "12.6(1)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.7(1)"
|
||||
},
|
||||
{
|
||||
"version_value": "12.7(1)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.1(1)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "12.1(1)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.0(1)"
|
||||
},
|
||||
{
|
||||
"version_value": "12.0(1)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.0(1)SR2"
|
||||
},
|
||||
{
|
||||
"version_value": "12.0(1)SR2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.0(1)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "12.0(1)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.0(1)SR3"
|
||||
},
|
||||
{
|
||||
"version_value": "12.0(1)SR3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.8(1)"
|
||||
},
|
||||
{
|
||||
"version_value": "12.8(1)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.8(1)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "12.8(1)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.8(1)SR2"
|
||||
},
|
||||
{
|
||||
"version_value": "12.8(1)SR2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(5)SR3"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(5)SR3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(6)"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(6)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(6)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(6)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "11.0(6)SR2"
|
||||
},
|
||||
{
|
||||
"version_value": "11.0(6)SR2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.3(1)SR6"
|
||||
},
|
||||
{
|
||||
"version_value": "10.3(1)SR6",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "10.3(1)SR7"
|
||||
},
|
||||
{
|
||||
"version_value": "10.3(1)SR7",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "12.7(1)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "12.7(1)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "14.0(1)SR1"
|
||||
},
|
||||
{
|
||||
"version_value": "14.0(1)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "14.0(1)"
|
||||
},
|
||||
{
|
||||
"version_value": "14.0(1)",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "14.0(1)SR2"
|
||||
},
|
||||
{
|
||||
"version_value": "14.0(1)SR2",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "14.0(1)SR3"
|
||||
},
|
||||
{
|
||||
"version_value": "14.0(1)SR3",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "14.1(1)"
|
||||
},
|
||||
{
|
||||
"version_value": "14.1(1)",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "14.1(1)SR1",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "14.1(1)SR1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042 Series Routers could allow an unauthenticated, remote attacker to bypass authentication on the affected device. This vulnerability is due to incorrect user input validation of incoming HTTP packets. An attacker could exploit this vulnerability by sending crafted requests to the web-based management interface. A successful exploit could allow the attacker to gain root privileges on the affected device."
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042 Series Routers could allow an unauthenticated, remote attacker to bypass authentication on the affected device.\r\n\r This vulnerability is due to incorrect user input validation of incoming HTTP packets. An attacker could exploit this vulnerability by sending crafted requests to the web-based management interface. A successful exploit could allow the attacker to gain root privileges on the affected device.\r\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -21,7 +21,8 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Using Referer Field for Authentication",
|
||||
"cweId": "CWE-293"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -39,100 +40,100 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "2.0.0.19-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "2.0.0.19-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "2.0.2.01-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "2.0.2.01-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "1.3.12.19-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.3.12.19-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "1.3.12.6-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.3.12.6-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "1.3.13.02-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.3.13.02-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "1.3.9.8-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.3.9.8-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "4.0.0.7",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.0.0.7"
|
||||
},
|
||||
{
|
||||
"version_value": "4.0.2.08-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.0.2.08-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "4.0.3.03-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.0.3.03-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "4.0.4.02-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.0.4.02-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.1.02",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.1.02"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.2.08",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.2.08"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.3.03",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.3.03"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.3.06",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.3.06"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.3.07",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.3.07"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.3.08",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.3.08"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.3.09",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.3.09"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.3.10",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.3.10"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.3.14",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.3.14"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.0.1-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "3.0.0.1-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.0.19-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "3.0.0.19-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.2.01-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "3.0.2.01-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "4.1.1.01",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.1.1.01"
|
||||
},
|
||||
{
|
||||
"version_value": "4.1.0.02-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "4.1.0.02-tm"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -162,7 +163,7 @@
|
||||
"exploit": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory."
|
||||
"value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for vulnerabilities CVE-2023-20025 and CVE-2023-20026 that are described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory."
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business Routers RV042 Series could allow an authenticated, remote attacker to inject arbitrary commands on an affected device. This vulnerability is due to improper validation of user input fields within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device."
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business Routers RV042 Series could allow an authenticated, remote attacker to inject arbitrary commands on an affected device.\r\n\r This vulnerability is due to improper validation of user input fields within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device.\r\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -21,7 +21,8 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
|
||||
"cweId": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -39,100 +40,180 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "2.0.0.19-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.00.29"
|
||||
},
|
||||
{
|
||||
"version_value": "2.0.2.01-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.00.33"
|
||||
},
|
||||
{
|
||||
"version_value": "1.3.12.19-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.01.16"
|
||||
},
|
||||
{
|
||||
"version_value": "1.3.12.6-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.01.17"
|
||||
},
|
||||
{
|
||||
"version_value": "1.3.13.02-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.01.18"
|
||||
},
|
||||
{
|
||||
"version_value": "1.3.9.8-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.01.20"
|
||||
},
|
||||
{
|
||||
"version_value": "4.0.0.7",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.02.16"
|
||||
},
|
||||
{
|
||||
"version_value": "4.0.2.08-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.15"
|
||||
},
|
||||
{
|
||||
"version_value": "4.0.3.03-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.16"
|
||||
},
|
||||
{
|
||||
"version_value": "4.0.4.02-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.17"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.1.02",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.18"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.2.08",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.19"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.3.03",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.20"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.3.06",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.21"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.3.07",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.22"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.3.08",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.24"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.3.09",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.26"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.3.10",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.27"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.3.14",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.28"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.0.1-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.03.29"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.0.19-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "2.0.0.19-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.2.01-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "2.0.2.01-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "4.1.1.01",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.3.12.19-tm"
|
||||
},
|
||||
{
|
||||
"version_value": "4.1.0.02-tm",
|
||||
"version_affected": "="
|
||||
"version_affected": "=",
|
||||
"version_value": "1.3.12.6-tm"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.3.13.02-tm"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.3.9.8-tm"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.0.0.7"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.0.2.08-tm"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.0.3.03-tm"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.0.4.02-tm"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.1.02"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.2.08"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.3.03"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.3.06"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.3.07"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.3.08"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.3.09"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.3.10"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.2.3.14"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "3.0.0.1-tm"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "3.0.0.19-tm"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "3.0.2.01-tm"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.1.1.01"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.1.0.02-tm"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -162,7 +243,7 @@
|
||||
"exploit": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory."
|
||||
"value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for vulnerabilities CVE-2023-20025 and CVE-2023-20026 that are described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory."
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
|
@ -21,7 +21,8 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Improper Clearing of Heap Memory Before Release ('Heap Inspection')",
|
||||
"cweId": "CWE-244"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user