CVE-2007-0648 (GCVE-0-2007-0648)
Vulnerability from cvelistv5
Published
2007-02-01 01:00
Modified
2024-08-07 12:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP.
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:26:54.093Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "23978",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23978"
},
{
"name": "20070131 SIP Packet Reloads IOS Devices Not Configured for SIP",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml"
},
{
"name": "1017575",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017575"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml"
},
{
"name": "22330",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22330"
},
{
"name": "cisco-sip-packet-dos(31990)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31990"
},
{
"name": "oval:org.mitre.oval:def:5138",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138"
},
{
"name": "ADV-2007-0428",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0428"
},
{
"name": "VU#438176",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/438176"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-01-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "23978",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23978"
},
{
"name": "20070131 SIP Packet Reloads IOS Devices Not Configured for SIP",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml"
},
{
"name": "1017575",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017575"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml"
},
{
"name": "22330",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22330"
},
{
"name": "cisco-sip-packet-dos(31990)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31990"
},
{
"name": "oval:org.mitre.oval:def:5138",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138"
},
{
"name": "ADV-2007-0428",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0428"
},
{
"name": "VU#438176",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/438176"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0648",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "23978",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23978"
},
{
"name": "20070131 SIP Packet Reloads IOS Devices Not Configured for SIP",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml"
},
{
"name": "1017575",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017575"
},
{
"name": "http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml"
},
{
"name": "22330",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22330"
},
{
"name": "cisco-sip-packet-dos(31990)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31990"
},
{
"name": "oval:org.mitre.oval:def:5138",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138"
},
{
"name": "ADV-2007-0428",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0428"
},
{
"name": "VU#438176",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/438176"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-0648",
"datePublished": "2007-02-01T01:00:00",
"dateReserved": "2007-01-31T00:00:00",
"dateUpdated": "2024-08-07T12:26:54.093Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2007-0648\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-02-01T01:28:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP.\"},{\"lang\":\"es\",\"value\":\"Cisco IOS despu\u00e9s de las versiones 12.3(14)T, 12.3(8)YC1, 12.3(8)YG y 12.4, con soporte de voz y sin el Session Initiated Protocol (SIP) configurado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante el env\u00edo de un paquete manipulado al puerto 5060/UDP.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32302AE-54E2-423A-A418-6C7EAE2CDF0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F616AE0-42B4-403B-B610-99DE15EE490D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFCEBBD5-FA7F-4478-8F00-AC6CA598CADC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)t5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A83281-667D-4D1A-9F76-CFF3E5AD560F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA88C064-898F-4C0D-A266-D7B3509C28A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF4D0E3-8015-4D6F-8364-B6EEAAE67971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2595DCBA-E6F2-4551-A804-4DBB137F076B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6DF12B-2A20-4AC5-8EC5-729008D87736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0AB8F07-AF43-4202-9908-F9A1DF6FFC03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2958873B-A0AB-4EAF-A5CF-8423739FAB07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D4D8C72-E7BB-40BF-9AE5-622794D63E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65B65738-134F-4C1A-916B-D6CD6365CB43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(1b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5331586-8380-4F77-8735-17EC0D0E503A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(1c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93024CE7-DBA3-4C25-B7D4-4D2DA6AB880D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)mr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA5769F6-8C69-4AC7-A3E3-75D275B2AC3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)mr1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35536E91-A58D-40F7-A256-34128E64B920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F69329B-4D37-428E-B467-E3B9314A4D61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9615B275-5748-46CC-8A77-4A9550A39050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"421CD923-6282-4404-A642-C04E1F57F12F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD4411CB-5EE9-455C-AE90-1770320EFD86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"593D1680-4883-43FE-A925-B87ED1D2E785\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FADF72EC-43B4-4FC0-9BA0-7CC91D4745B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBDB772E-F9A9-4EBA-958F-CDFCB2DA6BFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)xb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90769378-BBD1-48D0-921C-A79413B99CE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C6DF704-8CC8-42C3-83F1-4D38734DEAEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E636DC68-59FE-4BA0-BCFC-4DA97EE17B23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E0D6801-E9A8-416B-830B-7682A9AF65BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4B2F9E0-E5FF-42D7-8CEF-359FDDFB4059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23265E4D-855C-4CCC-A875-DFCBA55B3CB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(4\\\\)mr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB86291-EB40-4CFD-A424-898EFB3D518B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(4\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10AADAC-4687-4308-8E4F-B7F9549556DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(4\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A747987-5218-4C1E-87C4-0675CD4F7A2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B6483CB-7838-45F7-AE28-824AD71172A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(5b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04759B1E-8B40-460F-B33F-4E6332CFC31D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(6\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08AF3694-9686-444B-8D92-E41D262F74E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(6\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5595E7D-3CFD-4FF2-A6BE-59645058C54F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4235428-5E2E-4BCB-98B7-8844B19C7AA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(7a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A1E17AB-F645-4636-9337-3158556E85A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86150D11-94D7-43F9-9D19-33778558255F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(9\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDC43701-8A3A-42FB-B4F5-566DE59E542E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7414D32-88A1-416E-A717-3F47B6D1BE74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370DC543-AC01-4B91-88C7-60C323E35929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEAD7398-D1B2-47FB-952D-8C3162D5A363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99235FFB-4439-40B2-ADBD-B08E5DBBCCB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1797E4E-E15C-4148-9B3D-4FF6D1D815AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"544BD924-2CBD-4130-BBD3-5AD084C85FE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B78181E-E1D1-4C25-85DE-CA46BBF21765\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F36C3D-E9A2-41A1-BE71-4D8B00D228E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF610051-1638-4C1B-9864-11E34EFC4DE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB633E6C-025C-4B31-ABE7-8318C813376B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFED1FFB-899D-4A48-9CCA-0B8737AE1408\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/23978\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1017575\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/438176\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/22330\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0428\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/31990\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/23978\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1017575\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/438176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/22330\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0428\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/31990\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…