var-200401-0044
Vulnerability from variot
Cisco PIX firewall 5.x.x, and 6.3.1 and earlier, allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set. Cisco PIX Firewall Is SNMP Activate a specific SNMP Management station IP By address setting, SNMPv3 A vulnerability exists that crashes when trying to interpret a packet when it is received.Cisco PIX Firewall Service disruption (DoS) It may be in a state. The first issue has been reported to present itself when the affected PIX firewall processes an SNMPv3 message, in certain circumstances. The second issue that was reported by the vendor is that a remote attacker may close established VPN sessions between a Cisco PIX appliance that is configured as a VPN Client and a remote VPN server. This vulnerability is not affected only when the snmp-server host trap command is configured on the Cisco PIX firewall
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200401-0044", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pix firewall", "scope": "eq", "trust": 2.0, "vendor": "cisco", "version": "5.2" }, { "model": "pix firewall", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.2.2_.111" }, { "model": "pix firewall", "scope": "eq", "trust": 1.4, "vendor": "cisco", "version": "6.2" }, { "model": "pix firewall", "scope": "eq", "trust": 1.4, "vendor": "cisco", "version": "6.1" }, { "model": "pix firewall", "scope": "eq", "trust": 1.2, "vendor": "cisco", "version": "5.1" }, { "model": "pix firewall", "scope": "eq", "trust": 1.2, "vendor": "cisco", "version": "5.0" }, { "model": "pix firewall", "scope": "eq", "trust": 1.1, "vendor": "cisco", "version": "6.3" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2\\(3.210\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(4\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(3\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(4\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.3\\(2\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2\\(9\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(3\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(3.100\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.3" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(1\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.3" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2\\(6\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(1\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2\\(7\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(2\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.3\\(3.102\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2\\(2\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.3\\(1.200\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(5\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(4.101\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(4.206\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(2\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(4\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.3\\(3\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2\\(1\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(3\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2\\(5\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.3\\(1\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.3\\(1\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(1\\)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.3(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.2(3)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.2(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.2(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.1(4)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.0" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.3(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.3(1.200)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.3(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.2(5)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.2(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.2(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.2\\(3.210\\)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.2\\(1\\)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.2\\(2\\)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.2\\(5\\)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.1\\(4\\)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.1\\(4.206\\)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.2.111" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(3.100)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1.4" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(5)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(3)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0.4" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(4.101)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(4)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3(3)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(9)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(7)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(6)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(3.210)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.4" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1(4.206)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1(0.208)" }, { "model": "pix firewall", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.3.2" }, { "model": "pix firewall", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.2.3" }, { "model": "pix firewall", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.1.5" } ], "sources": [ { "db": "BID", "id": "9221" }, { "db": "BID", "id": "88171" }, { "db": "JVNDB", "id": "JVNDB-2003-000377" }, { "db": "CNNVD", "id": "CNNVD-200401-022" }, { "db": "NVD", "id": "CVE-2003-1003" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:cisco:pix_firewall", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2003-000377" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Security bulletin", "sources": [ { "db": "CNNVD", "id": "CNNVD-200401-022" } ], "trust": 0.6 }, "cve": "CVE-2003-1003", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2003-1003", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2003-1003", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-7828", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2003-1003", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2003-1003", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200401-022", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-7828", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-7828" }, { "db": "JVNDB", "id": "JVNDB-2003-000377" }, { "db": "CNNVD", "id": "CNNVD-200401-022" }, { "db": "NVD", "id": "CVE-2003-1003" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco PIX firewall 5.x.x, and 6.3.1 and earlier, allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set. Cisco PIX Firewall Is SNMP Activate a specific SNMP Management station IP By address setting, SNMPv3 A vulnerability exists that crashes when trying to interpret a packet when it is received.Cisco PIX Firewall Service disruption (DoS) It may be in a state. \nThe first issue has been reported to present itself when the affected PIX firewall processes an SNMPv3 message, in certain circumstances. \nThe second issue that was reported by the vendor is that a remote attacker may close established VPN sessions between a Cisco PIX appliance that is configured as a VPN Client and a remote VPN server. This vulnerability is not affected only when the snmp-server host \u003cif_name\u003e \u003cip_addr\u003e trap command is configured on the Cisco PIX firewall", "sources": [ { "db": "NVD", "id": "CVE-2003-1003" }, { "db": "JVNDB", "id": "JVNDB-2003-000377" }, { "db": "BID", "id": "9221" }, { "db": "BID", "id": "88171" }, { "db": "VULHUB", "id": "VHN-7828" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2003-1003", "trust": 2.8 }, { "db": "BID", "id": "9221", "trust": 1.1 }, { "db": "SECTRACK", "id": "1008474", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2003-000377", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200401-022", "trust": 0.7 }, { "db": "CISCO", "id": "20031215 CISCO PIX VULNERABILITIES", "trust": 0.6 }, { "db": "BID", "id": "88171", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-7828", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-7828" }, { "db": "BID", "id": "9221" }, { "db": "BID", "id": "88171" }, { "db": "JVNDB", "id": "JVNDB-2003-000377" }, { "db": "CNNVD", "id": "CNNVD-200401-022" }, { "db": "NVD", "id": "CVE-2003-1003" } ] }, "id": "VAR-200401-0044", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-7828" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:23:05.978000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20031215-pix", "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-pix.shtml" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2003-000377" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-7828" }, { "db": "JVNDB", "id": "JVNDB-2003-000377" }, { "db": "NVD", "id": "CVE-2003-1003" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-pix.shtml" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-1003" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-1003" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/9221" }, { "trust": 0.8, "url": "http://www.securitytracker.com/alerts/2003/dec/1008474.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-7828" }, { "db": "BID", "id": "9221" }, { "db": "BID", "id": "88171" }, { "db": "JVNDB", "id": "JVNDB-2003-000377" }, { "db": "CNNVD", "id": "CNNVD-200401-022" }, { "db": "NVD", "id": "CVE-2003-1003" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-7828" }, { "db": "BID", "id": "9221" }, { "db": "BID", "id": "88171" }, { "db": "JVNDB", "id": "JVNDB-2003-000377" }, { "db": "CNNVD", "id": "CNNVD-200401-022" }, { "db": "NVD", "id": "CVE-2003-1003" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-01-05T00:00:00", "db": "VULHUB", "id": "VHN-7828" }, { "date": "2003-12-15T00:00:00", "db": "BID", "id": "9221" }, { "date": "2004-01-05T00:00:00", "db": "BID", "id": "88171" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000377" }, { "date": "2003-12-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200401-022" }, { "date": "2004-01-05T05:00:00", "db": "NVD", "id": "CVE-2003-1003" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-7828" }, { "date": "2003-12-15T00:00:00", "db": "BID", "id": "9221" }, { "date": "2016-07-06T14:33:00", "db": "BID", "id": "88171" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000377" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200401-022" }, { "date": "2018-10-30T16:26:18.123000", "db": "NVD", "id": "CVE-2003-1003" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "9221" }, { "db": "BID", "id": "88171" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco PIX Firewall In SNMPv3 Service disruption by (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2003-000377" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-200401-022" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.