cve-2005-2451
Vulnerability from cvelistv5
Published
2005-08-03 04:00
Modified
2024-08-07 22:30
Severity ?
EPSS score ?
Summary
Cisco IOS 12.0 through 12.4 and IOS XR before 3.2, with IPv6 enabled, allows remote attackers on a local network segment to cause a denial of service (device reload) and possibly execute arbitrary code via a crafted IPv6 packet.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:30:00.939Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "18332", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/18332" }, { "name": "VU#930892", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/930892" }, { "name": "cisco-ios-ipv6-packet-command-execution(21591)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21591" }, { "name": "TA05-210A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-210A.html" }, { "name": "1014598", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014598" }, { "name": "20050729 IPv6 Crafted Packet Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml" }, { "name": "20050729 Cisco IOS Shellcode Presentation", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0663.html" }, { "name": "14414", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14414" }, { "name": "oval:org.mitre.oval:def:5445", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5445" }, { "name": "16272", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16272" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-07-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco IOS 12.0 through 12.4 and IOS XR before 3.2, with IPv6 enabled, allows remote attackers on a local network segment to cause a denial of service (device reload) and possibly execute arbitrary code via a crafted IPv6 packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "18332", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/18332" }, { "name": "VU#930892", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/930892" }, { "name": "cisco-ios-ipv6-packet-command-execution(21591)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21591" }, { "name": "TA05-210A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-210A.html" }, { "name": "1014598", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014598" }, { "name": "20050729 IPv6 Crafted Packet Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml" }, { "name": "20050729 Cisco IOS Shellcode Presentation", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0663.html" }, { "name": "14414", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14414" }, { "name": "oval:org.mitre.oval:def:5445", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5445" }, { "name": "16272", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16272" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2451", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco IOS 12.0 through 12.4 and IOS XR before 3.2, with IPv6 enabled, allows remote attackers on a local network segment to cause a denial of service (device reload) and possibly execute arbitrary code via a crafted IPv6 packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "18332", "refsource": "OSVDB", "url": "http://www.osvdb.org/18332" }, { "name": "VU#930892", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/930892" }, { "name": "cisco-ios-ipv6-packet-command-execution(21591)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21591" }, { "name": "TA05-210A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA05-210A.html" }, { "name": "1014598", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014598" }, { "name": "20050729 IPv6 Crafted Packet Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml" }, { "name": "20050729 Cisco IOS Shellcode Presentation", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0663.html" }, { "name": "14414", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14414" }, { "name": "oval:org.mitre.oval:def:5445", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5445" }, { "name": "16272", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16272" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2451", "datePublished": "2005-08-03T04:00:00", "dateReserved": "2005-08-03T00:00:00", "dateUpdated": "2024-08-07T22:30:00.939Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-2451\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-08-03T04:00:00.000\",\"lastModified\":\"2024-11-20T23:59:35.060\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco IOS 12.0 through 12.4 and IOS XR before 3.2, with IPv6 enabled, allows remote attackers on a local network segment to cause a denial of service (device reload) and possibly execute arbitrary code via a crafted IPv6 packet.\"},{\"lang\":\"es\",\"value\":\"Cisco IOS 12.0 hasta 12.4 y IOS XR anterior a 3.2 con IPv6 habilitado, permite que atacantes remotos en un segmento de red local provoquen una denegaci\u00f3n de servicio (recarga del dispositivo) y posiblmemente ejecuten c\u00f3digo arbitrario mediante un paquete IPv6 ama\u00f1ado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C398460-3F38-4AA7-A4B1-FD8A01588DB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B6B0C2F-2FBE-4422-AD30-305100C595CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBEA01D2-B985-4575-AF00-144CE2E3024D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65E78DEE-1125-4183-A0CD-947B850E956E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7813F511-CF6D-487F-9D1C-7A6CF85AD724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"677DC4B6-8B3D-4A0D-9934-743FD7494DF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"884753D4-3AF0-4723-9D51-26BA7B4CA533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF3601D-DF44-4A10-A424-8E97C65A36A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC38BD6C-9823-4D2A-8BE2-60AABE3C4932\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1835410-77EB-46F2-ACF0-379759D4B0D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BB103ED-B170-4193-84CD-4C59F4D6A10A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F88DCCDE-6A81-473F-B4FE-95A84F8DF964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D55886-268F-4E4D-B00F-8A5D97A73BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E314B0F7-1A27-483E-B3B3-947A5561281F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3EF2531-3E6B-4FDC-B96B-2BC3F8EAF39A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05B838C9-E60E-46A3-A5FB-4F67291D0851\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B29F111-CBA4-464D-8B25-C2677BA270EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E96C76C5-52BA-45D9-9803-048E770BAA84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42EB3A6A-8B37-47E6-AA9B-1B13FC08F542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4BA2D6E-FD22-4BFD-B8B4-D6542E173C72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78B9E2C6-0E23-4AC9-906F-28BBC15868DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDC41749-91FC-43DB-A52F-AC3E3A2205C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0195AE-24FD-43B2-892B-F646B8B5ED6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2eu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCA9F8FF-94EA-4D1D-93AE-623075014426\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"316924D4-10D4-4C98-AF05-DDE1D530A205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11866346-C29A-463D-A18F-528C23DD579E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91F44EC8-13BF-4032-9EBA-0D50C6A353BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B98E703A-717D-4997-AFBC-CAE4B644025D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01A0A03A-5BFE-4A15-A983-B3EB8EE6B25A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B27825D-099A-4733-8D3F-8EF2B050E5B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A63E2B-8C1B-4EF7-BCDD-BBF3EC2C7113\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2mx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED8A1FE0-F74A-4C92-8625-7C933128B567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D035A35-D53E-4C49-B4E4-F40B85866F27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2seb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB7E760-8260-4488-B9FB-C741C1763F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F4B373-490C-463F-B518-89D0CABB852C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD1A9400-571E-4955-AB84-C49A4255A5B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC70491B-F701-4D33-A314-C686469DBD2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"198C24E9-6D45-44FD-B502-D14ACDA99EDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DEF14D5-1327-4012-913F-DA0E12C4E953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DE0B5B8-DEB1-4021-B854-177C0D9FD73A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7A672BD-87AE-424D-8735-073BBE9CE164\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95C033E3-184B-4AC1-B10D-8318FEAF73FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC1DDD7C-7921-45D3-81F7-4D9A407CBB5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A68D177-B028-4025-BD7B-82ACDB2D1E21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09458CD7-D430-4957-8506-FAB2A3E2AA65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E709D6B-61DB-4905-B539-B8488D7E2DC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84900BB3-B49F-448A-9E04-FE423FBCCC4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAC6758B-C6EE-45CB-AC2D-28C4AE709DD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"075CD42D-070A-49BA-90D9-E7925BB41A38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCB9967A-1EBD-4BE0-8651-1C7D42B2BF4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AB8E66C-A16F-4CC5-9FDF-AE274FF035EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"746DDC61-3981-4E93-A7EE-C120E0265485\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC88CC5-CF58-48A3-AFB6-FD38E5F40845\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF2C6C2-58E8-4EA6-84FB-4D11F31490A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4628FDA0-4260-4493-92C9-4574E5EC06A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9FA064A-6E1A-4415-84D4-1A33FF667011\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE896909-F8C3-4723-B5E7-9FB5FA2B73B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9CDCE5-F6D3-4FA3-ADA0-EED2517FF7EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E03EE34-C398-43B4-A529-BE7BAFA4B3C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21147732-FA22-4728-B5F2-D115B78A8EDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D717498-4DF9-4D15-A25B-D777FF460E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B40548F-3914-4227-9E4C-F1B34071C069\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1C23EC9-C1C6-4F73-9FF5-24A5B97B8D91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B09B72E-6862-4115-9A0B-574089A94289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC38B64C-E246-467F-A185-669497DEA839\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E5C90EE-A9C0-461C-9E89-732BFA9BD066\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"972EC35D-B727-49A0-A0F1-654FD4E9576C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E74B6350-C2F8-4786-8E32-2ED6C188A5E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E26473-A8EF-44C5-B550-5E0B86D31291\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"663FE3CE-FA09-46A2-9C0D-2797D9137A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86309E93-F2C9-4334-9A1C-989EFDC99215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"761D49D6-0624-41CE-829E-49E7EA679EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFAF394-6E9A-4CD6-B8A6-5BDDE4EC8EC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65318A70-40FF-4BE8-962B-DFCD5C476166\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B6DB954-EDC8-4A81-8C26-9D3DBC68FC67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"552C1E7A-2FFA-49BC-BF09-F0DE9B0C7502\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"869CEAF7-59D6-4651-8D89-0244D6C430A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"059FBAA6-3127-4DF9-99AD-AA3A16317B6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E0E376F-64E1-4632-9A8E-11DC99FB245F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF440B52-C6AE-4608-BE71-01B354D37BEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"243BEF5E-F693-450E-B274-FD7CF34B6771\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7918C59-1678-4F24-A7C2-68824D1B59A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE72804E-600D-47FA-B3BF-36BD3CF13A75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAD14B6D-CA11-41C1-9382-70CF1F5B4C8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"969A5BAA-19D5-4411-BABB-FE55DBA7C7D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54B41182-7AA8-49D1-BAC3-EAF312E43553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E11BBB83-147B-4FBF-B263-77FCCFB2D92D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E84677D-793D-44C5-80E9-FC29C3183278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E70E5B1F-E72C-4DAB-B6FA-977EF04BFBDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECFA2358-6B79-472D-9092-FF99DC3DF042\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C26842-FF50-436F-8DB6-15A70082CD1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9384B48D-0F62-4042-BE8F-9A8F5FE9A3D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4A31301-AAB0-4744-98B2-695D88798D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECB4BA74-BE9F-43D5-9D0F-78F4F2BB19B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CEB27CF-46B5-4780-964C-C31193614B74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F1094F9-7222-4DE0-A368-7421ABA66E3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C7EA2BB-A52A-438C-8EB5-CD283CACBACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"574FFD6F-D56C-41DB-A978-E501BA3CA5D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11790F38-3720-45CF-9FD4-A8E5867684D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AE2282B-6693-4E4B-8662-501EBC14CD9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56365432-1E57-4D35-B764-DDDA878B96ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"390755B3-30B7-4086-8FB2-A41614F747D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A925BA5C-AB2F-4B73-BA93-55664A319CAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0668C45B-9D25-424B-B876-C1721BFFE5DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"292F6F99-19B3-4106-A432-5DE916CCDD56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40183EF8-BD19-49AD-9E55-7FCCA635327F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8E40D5D-F46E-4098-A46A-1A52A343310D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D73E5138-016A-48EC-A367-3D3285AAFED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C3B413-76F7-413B-A51F-29834F9DE722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84C89CFF-64BB-4058-9C49-C6BF3E5D8DB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACB3B5E3-BDEE-4F29-AB02-BBFC6088D77E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9F12741-69FB-46DD-A670-8461492B338A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EC2D158-6174-4AE8-83DA-125B072B6980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5688D88-A550-43EB-8854-2E132EC71156\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8218E2D3-4F1E-440F-A2B2-A68D4692BB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2E3044F-3CE8-4970-9A7F-FDF555F622A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA212293-7BAF-4AD9-BD30-E953CBA7CB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEF3B2A9-027B-4141-B0FB-D31A2C918CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1018E04C-5575-4D1A-B482-D1CDB9AD6A50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68FC4904-1F4D-4E10-AF95-911B07827598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB57AAA9-4715-468F-A734-A12209A6069F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86B9E611-3F06-424C-96EF-EE4997C70AB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0A5760A-9FFE-4941-B2BD-7DD54B1E1B37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98FE195E-084B-4F4C-800D-850165DED48C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A310F30-F94D-4A70-94BD-6B94D7B5F5B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB74F350-37F8-48DF-924E-415E51932163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E618BF54-56DC-40FC-A515-3BFB4366F823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1976E53-85A6-494F-B8AC-847E7988850C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320C5597-68BE-4899-9EBB-9B4DEE8EA7DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"520304A4-EB15-42A8-A402-8251A4D2076D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C46B66D6-1BF1-4DCA-868F-BADE3CB96063\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA88C064-898F-4C0D-A266-D7B3509C28A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"139B1182-61A3-4F3D-9E29-758F27917646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CC3706F-B00A-405E-917E-7FD5217E0501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B46199E-0DF1-4B3F-A29E-1A2FC016F0F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF4D0E3-8015-4D6F-8364-B6EEAAE67971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6DF12B-2A20-4AC5-8EC5-729008D87736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0AB8F07-AF43-4202-9908-F9A1DF6FFC03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D4D8C72-E7BB-40BF-9AE5-622794D63E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7414D32-88A1-416E-A717-3F47B6D1BE74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEAD7398-D1B2-47FB-952D-8C3162D5A363\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"778F5573-0741-442F-AFFA-937053F8280C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADF0D7F5-7A9C-4E58-A9DB-33BF13CE135D\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0663.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/16272\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1014598\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/930892\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.osvdb.org/18332\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/14414\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA05-210A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/21591\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5445\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0663.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/16272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1014598\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/930892\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.osvdb.org/18332\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/14414\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA05-210A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/21591\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5445\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.