mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
153 lines
5.3 KiB
JSON
153 lines
5.3 KiB
JSON
{
|
|
"id": "CVE-2004-1163",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2005-01-10T05:00:00.000",
|
|
"lastModified": "2024-11-20T23:50:15.163",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cisco CNS Network Registrar Central Configuration Management (CCM) server 6.0 through 6.1.1.3 allows remote attackers to cause a denial of service (CPU consumption) by ending a connection after sending a certain sequence of packets."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"baseScore": 5.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cns_network_registrar:6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "26ABB25A-70E2-4D2E-B4E1-A0ED7AB197AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cns_network_registrar:6.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DE2D46FC-A734-4F8D-9DD4-BC89E4A57491"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cns_network_registrar:6.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "476B5343-48BA-4C48-9612-BF15F604A68D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cns_network_registrar:6.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "55041A5F-DA87-4604-8760-5E30284AB1F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cns_network_registrar:6.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A1134D71-9504-47DB-8E3D-104B940A8306"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cns_network_registrar:6.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ED41314A-7EAD-44D2-82CF-1F63DB12B0B8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cns_network_registrar:6.0.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A494B2DF-9DD8-450F-B77A-E3ED73864BAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cns_network_registrar:6.0.5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F63551A4-8C7A-4CB2-A1AF-28FF58EC5FC6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cns_network_registrar:6.0.5.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A696A715-F53A-47C5-83AA-ED4CB1587EA4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cns_network_registrar:6.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "612D3B86-AB36-4601-AC2C-7B1802C52493"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cns_network_registrar:6.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C72B164C-0843-4A39-B28D-5F6303191FB1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cns_network_registrar:6.1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "926C9F4D-8323-4C5D-8206-0F6E361B51E4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cns_network_registrar:6.1.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0471BA89-4FE4-4573-B321-34A5BD65E39B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cns_network_registrar:6.1.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "95112707-CFED-48C7-8943-AB0C2030616F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008036786d.shtml",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18327",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008036786d.shtml",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18327",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |