var-200208-0065
Vulnerability from variot

The default configuration of the proxy for Cisco Cache Engine and Content Engine allows remote attackers to use HTTPS to make TCP connections to allowed IP addresses while hiding the actual source IP. Cisco Cache Engines offer the ability to proxy HTTP, HTTPS and FTP transactions. Since these services may be placed on one of numerous ports, the default configuration allows a user behind the proxy to connect to another system on any port. Insufficient default access control is set on the device, allowing any user that can connect to the system to proxy a request through to another system. Cisco Cache Engine series products are network-integrated cache solutions developed and maintained by CISCO, which can reduce WAN bandwidth usage, maximize network service quality, and improve the scalability of existing networks

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200208-0065",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cache engine 570",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.2.0"
      },
      {
        "model": "cache engine 570",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "570"
      },
      {
        "model": "cache engine 550",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.2.0"
      },
      {
        "model": "cache engine 550",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.4.0"
      },
      {
        "model": "cache engine 550",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "cache engine 570",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.4.0"
      },
      {
        "model": "cache engine 570",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "7320"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "590"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "560"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "507"
      },
      {
        "model": "content router 4430",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "560_4.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "507_3.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "507_4.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "507_4.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "590_2.2.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "590_4.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "560_4.0"
      },
      {
        "model": "cache engine 550",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "7320_3.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "7320_4.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "507_2.2.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "7320_2.2.0"
      },
      {
        "model": "enterprise content delivery network software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "content distribution manager 4630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "content distribution manager 4650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "content distribution manager 4630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "content distribution manager 4650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "590_4.1"
      },
      {
        "model": "enterprise content delivery network software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "590_3.1"
      },
      {
        "model": "content distribution manager 4630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "content distribution manager 4650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "cache engine 505",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "7320_4.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "560_3.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "560_2.2.0"
      },
      {
        "model": "cache engine 505",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.4.0"
      },
      {
        "model": "content router 4430",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "content router 4430",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "content router 4430",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "content router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "44304.1"
      },
      {
        "model": "content router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "44304.0"
      },
      {
        "model": "content router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4430"
      },
      {
        "model": "content engine module for cisco router series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3700"
      },
      {
        "model": "content engine module for cisco router series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3600"
      },
      {
        "model": "content engine module for cisco router series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2600"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7325"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "73204.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "73204.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "73203.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "73202.2.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5904.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5904.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5903.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5902.2.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "565"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5604.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5604.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5603.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5602.2.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "510"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5074.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5074.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5073.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5072.2.0"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "46504.1"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "46504.0"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4650"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "46304.1"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "46304.0"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4630"
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5704.0"
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5703.0"
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5702.2.0"
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "570"
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5504.0"
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5503.0"
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5502.2.0"
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "550"
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5054.0"
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5053.0"
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5052.2.0"
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "505"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "4751"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0778"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Systems Product Security Incident Response Team\u203b psirt@cisco.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-017"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2002-0778",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2002-0778",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-5169",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2002-0778",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200208-017",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-5169",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5169"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0778"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The default configuration of the proxy for Cisco Cache Engine and Content Engine allows remote attackers to use HTTPS to make TCP connections to allowed IP addresses while hiding the actual source IP. Cisco Cache Engines offer the ability to proxy HTTP, HTTPS and FTP transactions.  Since these services may be placed on one of numerous ports, the default configuration allows a user behind the proxy to connect to another system on any port.  Insufficient default access control is set on the device, allowing any user that can connect to the system to proxy a request through to another system. Cisco Cache Engine series products are network-integrated cache solutions developed and maintained by CISCO, which can reduce WAN bandwidth usage, maximize network service quality, and improve the scalability of existing networks",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0778"
      },
      {
        "db": "BID",
        "id": "4751"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5169"
      }
    ],
    "trust": 1.26
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "4751",
        "trust": 2.0
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0778",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-017",
        "trust": 0.7
      },
      {
        "db": "CISCO",
        "id": "20020528 TRANSPARENT CACHE ENGINE AND CONTENT ENGINE TCP RELAY VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "9082",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-5169",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5169"
      },
      {
        "db": "BID",
        "id": "4751"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0778"
      }
    ]
  },
  "id": "VAR-200208-0065",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5169"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-22T22:58:41.953000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0778"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "http://www.cisco.com/warp/public/707/transparentcache-tcp-relay-vuln-pub.shtml"
      },
      {
        "trust": 2.7,
        "url": "http://www.securityfocus.com/bid/4751"
      },
      {
        "trust": 2.7,
        "url": "http://www.iss.net/security_center/static/9082.php"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5169"
      },
      {
        "db": "BID",
        "id": "4751"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0778"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-5169"
      },
      {
        "db": "BID",
        "id": "4751"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0778"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-08-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-5169"
      },
      {
        "date": "2002-05-15T00:00:00",
        "db": "BID",
        "id": "4751"
      },
      {
        "date": "2002-05-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200208-017"
      },
      {
        "date": "2002-08-12T04:00:00",
        "db": "NVD",
        "id": "CVE-2002-0778"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-5169"
      },
      {
        "date": "2002-05-15T00:00:00",
        "db": "BID",
        "id": "4751"
      },
      {
        "date": "2005-05-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200208-017"
      },
      {
        "date": "2024-11-20T23:39:51.030000",
        "db": "NVD",
        "id": "CVE-2002-0778"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-017"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Cache Engine Default configuration Any user can use proxy vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-017"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "unknown",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-017"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…