var-201610-0282
Vulnerability from variot

The Threat Management Console in Cisco Firepower Management Center 5.2.0 through 6.0.1 allows remote authenticated users to execute arbitrary commands via crafted web-application parameters, aka Bug ID CSCva30872. An attacker can exploit this issue to execute arbitrary commands within the context of the affected application. This issue is tracked by Cisco Bug ID CSCva30872

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0282",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.3.1.6"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4.1"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.3.0.3"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.3.1"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.3.0.2"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4.1.2"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4.1.3"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4.1.4"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4.1.5"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4.1.6"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "6.0.1"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4.1.1"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.3.0"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.3.1.3"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4.0"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4.0.2"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.3.1.5"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.3.0.4"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.2.0"
      },
      {
        "model": "secure firewall management center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.3.1.4"
      },
      {
        "model": "firepower management center",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.2.0 to  6.0.1"
      },
      {
        "model": "firepower management center",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.4.0"
      },
      {
        "model": "firepower management center",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.3.0.2"
      },
      {
        "model": "firepower management center",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.4.1.1"
      },
      {
        "model": "firepower management center",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.3.1.5"
      },
      {
        "model": "firepower management center",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.4.1.2"
      },
      {
        "model": "firepower management center",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.3.0.4"
      },
      {
        "model": "firepower management center",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.4.1"
      },
      {
        "model": "firepower management center",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.3.1.4"
      },
      {
        "model": "firepower management center",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.4.0.2"
      },
      {
        "model": "firepower management center",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.3.1.6"
      },
      {
        "model": "firepower management center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "93414"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-005141"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-106"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6433"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:cisco:firepower_management_center",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-005141"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "93414"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2016-6433",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "CVE-2016-6433",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "VHN-95253",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2016-6433",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2016-6433",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-6433",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-6433",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201610-106",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-95253",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95253"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-005141"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-106"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6433"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Threat Management Console in Cisco Firepower Management Center 5.2.0 through 6.0.1 allows remote authenticated users to execute arbitrary commands via crafted web-application parameters, aka Bug ID CSCva30872. \nAn attacker can exploit this issue to execute arbitrary commands within the context of the affected application. \nThis issue is tracked by Cisco Bug ID CSCva30872",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-6433"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-005141"
      },
      {
        "db": "BID",
        "id": "93414"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95253"
      }
    ],
    "trust": 1.98
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-95253",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95253"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-6433",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "93414",
        "trust": 1.4
      },
      {
        "db": "PACKETSTORM",
        "id": "140467",
        "trust": 1.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "41041",
        "trust": 1.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "40463",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-005141",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "138988",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-106",
        "trust": 0.7
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-92711",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-95253",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95253"
      },
      {
        "db": "BID",
        "id": "93414"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-005141"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-106"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6433"
      }
    ]
  },
  "id": "VAR-201610-0282",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95253"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-27T22:59:43.084000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20161005-ftmc",
        "trust": 0.8,
        "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc"
      },
      {
        "title": "Cisco Firepower Management Center Fixes for remote command execution vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64533"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-005141"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-106"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95253"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-005141"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6433"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161005-ftmc"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/93414"
      },
      {
        "trust": 1.1,
        "url": "https://www.exploit-db.com/exploits/40463/"
      },
      {
        "trust": 1.1,
        "url": "https://www.exploit-db.com/exploits/41041/"
      },
      {
        "trust": 1.1,
        "url": "http://packetstormsecurity.com/files/140467/cisco-firepower-management-console-6.0-post-authentication-useradd.html"
      },
      {
        "trust": 1.1,
        "url": "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking"
      },
      {
        "trust": 1.1,
        "url": "https://www.korelogic.com/resources/advisories/kl-001-2016-007.txt"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6433"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6433"
      },
      {
        "trust": 0.6,
        "url": "http://packetstormsecurity.com/files/138988/cisco-firepower-threat-management-command-execution.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95253"
      },
      {
        "db": "BID",
        "id": "93414"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-005141"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-106"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6433"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-95253"
      },
      {
        "db": "BID",
        "id": "93414"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-005141"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-106"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6433"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-10-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-95253"
      },
      {
        "date": "2016-10-05T00:00:00",
        "db": "BID",
        "id": "93414"
      },
      {
        "date": "2016-10-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-005141"
      },
      {
        "date": "2016-10-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201610-106"
      },
      {
        "date": "2016-10-06T10:59:14.337000",
        "db": "NVD",
        "id": "CVE-2016-6433"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-01-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-95253"
      },
      {
        "date": "2016-10-10T03:03:00",
        "db": "BID",
        "id": "93414"
      },
      {
        "date": "2016-10-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-005141"
      },
      {
        "date": "2016-10-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201610-106"
      },
      {
        "date": "2024-11-26T16:09:02.407000",
        "db": "NVD",
        "id": "CVE-2016-6433"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-106"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Firepower Management Center of  Threat Management Console Vulnerable to arbitrary command execution",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-005141"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-106"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.