mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
543 lines
20 KiB
JSON
543 lines
20 KiB
JSON
{
|
|
"id": "CVE-2004-0714",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2004-07-27T04:00:00.000",
|
|
"lastModified": "2024-11-20T23:49:14.063",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption)."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Cisco Internetwork Operating System (IOS) 12.0S a 12.3T intenta procesar operaciones SNMP solicitadas en puertos inapropiados (UDP 162 y un puerto UDP escogido aleatoriamente), lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (recarga del dispositivo y corrupci\u00f3n de memoria)"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"baseScore": 5.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(23\\)s4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "332C413B-7AC7-4475-A968-9D0B7EF14B6E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(23\\)s5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "35999D5E-F831-446C-B509-F1531A2D1DCD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(24\\)s4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "58DF5979-73D5-4B2E-B98E-CD0AB8517F45"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(24\\)s5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1EA92F7A-C14E-4186-8E96-51D2BDC40DE0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(26\\)s1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "179CEE21-E5CA-466A-BAF0-8936F2E0B06F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(27\\)s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "00682210-2C86-4912-A423-5F7011C2FA2E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "498F4C0D-393D-4406-9752-4E49D6BB42B5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9C87916-D186-4E36-A4B6-5FA858FFC7E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C398460-3F38-4AA7-A4B1-FD8A01588DB5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0sv:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3999B90E-FE66-4B5D-8186-66C658855D7B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D0C3B6E2-3D33-457E-B85D-8C2FC9DA2FE4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C41AB141-A566-4738-8E07-E6410590FB0A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F074DF74-81FA-4F09-A6E5-18DD9A4E76C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E4041EB0-F402-4C01-9337-212E3E461AF9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0DEB16EF-D0C1-4C56-85B1-3C07D8CFD493"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DFCFD88F-4320-4F4F-9CAD-BA8A5AA5D389"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ABF2BEC0-6D37-4BC2-9A78-FC0D06CE7573"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "379E0F70-EE01-48F9-A4F0-BFCF9BDAB4AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17CD0C63-7500-4A32-BD85-27E6C2F70FB3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7126E176-D739-4102-8F10-1EEB8C6A219D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E90C0554-1A50-4341-AB07-80AA854673D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4A8C5149-40F8-40C9-9FC3-7E7C68801320"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "46FF39C5-CC37-4573-BB18-36254D38509B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1AF45D8-A32A-482F-8183-F0DC3C4FB5DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B377A8B9-90F2-41B7-9098-5ABEB621E2E3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2B15FCC-1BB3-41CA-9550-6D55DD381F25"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(12g\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B7CC6B5-44B7-4DCA-86C8-F032AF65FDAC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(12h\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "208A52BF-BAE3-4F5F-9279-88C360FDCBC5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10151339-0261-4F5D-9601-F048C0B70908"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2498113D-65B7-4144-AD1C-9FCB6534B7BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(21\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9324BF58-67E2-410D-AA71-F280B3D64498"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(21a\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "060D7CA2-0A02-49E3-BCFB-EFE7F6EC08F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(23\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "947062EE-A5CF-4A7F-8EF7-921F45118268"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2D035A35-D53E-4C49-B4E4-F40B85866F27"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5DEF14D5-1327-4012-913F-DA0E12C4E953"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2zq:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "94E748F5-FA9B-4627-AB30-5414A2952ADB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0668C45B-9D25-424B-B876-C1721BFFE5DA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)t3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "19940BFF-0888-4717-AC5F-87A85BE165A5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E5A2A58-D7B2-4018-BAAE-D6CB49A3A709"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C268494-F83A-488D-AEE6-AF7D319B6F64"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68BCC003-3F88-4369-A387-6B8D0FDFBE32"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8DD45AA0-EEE1-43FF-B04D-4063769D71AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7873D1DB-80D0-4076-8716-7618D7161EE2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DF292613-B9BC-4CF1-A6FA-4AFC077D8632"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "23B1AF9D-106A-43CB-972C-5E85ADFC355D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "25C6BBA6-8D45-4BA7-B88E-44D9ECE88009"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8CF0189B-964F-46EC-BE5F-8076CFE7AB8F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(5a\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "53430E70-FBAD-42F7-8614-7AB04E566810"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B670057C-7A86-4F61-8FF5-88E6BFE2B5F1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(5b\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4403BFFB-8A89-4512-8030-5DEDC0C0FF93"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(6\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2D9B4FE3-7A03-430F-AE68-743559D74DEC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "292F6F99-19B3-4106-A432-5DE916CCDD56"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0C3B413-76F7-413B-A51F-29834F9DE722"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9F12741-69FB-46DD-A670-8461492B338A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7EC2D158-6174-4AE8-83DA-125B072B6980"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A5688D88-A550-43EB-8854-2E132EC71156"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8218E2D3-4F1E-440F-A2B2-A68D4692BB17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2E3044F-3CE8-4970-9A7F-FDF555F622A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1018E04C-5575-4D1A-B482-D1CDB9AD6A50"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86B9E611-3F06-424C-96EF-EE4997C70AB9"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04472ED2-EB97-47E1-938E-D69C363E81C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10988AA9-A807-4E70-8197-6F9EFC13AE86"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C8951276-CDEF-4F54-93DF-B96DB10E6530"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D5A594C2-98BB-4AC5-9CC5-89FE97D63323"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B35325A-98F6-41DF-ADD8-91ED992A3ED3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F0B06C5B-73C2-47F1-9ED6-B59F9C1C5AF1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9758019-F6EA-4552-B070-5A9EBE73BB86"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E75DB3F4-94A8-4341-9C01-1F0DC25A3402"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ons_15454e_optical_transport_platform:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9442E2B1-6D21-46FC-9782-CD441254EEFB"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/162451",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/10186",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA04-111B.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15921",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5845",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/162451",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/10186",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA04-111B.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15921",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5845",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |