var-200702-0472
Vulnerability from variot

The command line interface (CLI) in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G, with firmware 8.0(4)SR1 and earlier allows local users to obtain privileges or cause a denial of service via unspecified vectors. NOTE: this issue can be leveraged remotely via CVE-2007-1063. The problem is CVE-2007-1063 It is a problem that can be attacked remotely via.Authorization and denial of service by local user (DoS) There is a possibility of being put into a state. Unified Ip Phone 7970G is prone to a denial-of-service vulnerability. The CLI in several Cisco products is vulnerable to permissions and access control issues. The vulnerability stems from the lack of effective permissions and access control measures in network systems or products.

Secunia is proud to announce the availability of the Secunia Software Inspector.

The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor.

Try it out online: http://secunia.com/software_inspector/

TITLE: Cisco Unified IP Conference Station / IP Phone Default Accounts

SECUNIA ADVISORY ID: SA24262

VERIFY ADVISORY: http://secunia.com/advisories/24262/

CRITICAL: Moderately critical

IMPACT: Security Bypass

WHERE:

From local network

OPERATING SYSTEM: Cisco Unified IP Conference Station 7936 http://secunia.com/product/13540/ Cisco Unified IP Conference Station 7935 http://secunia.com/product/13541/ Cisco Unified IP Phones 7900 Series http://secunia.com/product/13543/

DESCRIPTION: Some security issues have been reported in Cisco Unified IP Conference Station and IP Phones, which can be exploited by malicious people to access a vulnerable device.

1) A design error in way the administrative HTTP interface of Cisco Unified IP Conference Station handles the state of administrator login sessions can be exploited to bypass the user authentication by accessing management URLs directly.

SOLUTION: Update to a fixed version (see the vendor's advisory for details).

PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Christian Reichert, Christian Blum, and Jens Link of Intact Integrated Services. 2) Reported by the vendor.

ORIGINAL ADVISORY: Cisco Systems: http://www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml http://www.cisco.com/warp/public/707/cisco-air-20070221-phone.shtml

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200702-0472",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "unified ip phone 7961g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "8.0\\(4\\)"
      },
      {
        "model": "unified ip phone 7911g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "8.0\\(4\\)"
      },
      {
        "model": "unified ip phone 7970g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "8.0\\(4\\)"
      },
      {
        "model": "unified ip phone 7906g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "8.0\\(4\\)"
      },
      {
        "model": "unified ip phone 7971g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "8.0\\(4\\)"
      },
      {
        "model": "unified ip phone 7941g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "8.0\\(4\\)"
      },
      {
        "model": "unified ip phone 7911g",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "firmware 8.0(4)sr1"
      },
      {
        "model": "unified ip phone 7941g",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "firmware 8.0(4)sr1"
      },
      {
        "model": "unified ip phone 7961g",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "firmware 8.0(4)sr1"
      },
      {
        "model": "unified ip phone 7970g",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "firmware 8.0(4)sr1"
      },
      {
        "model": "unified ip phone 7906g",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "firmware 8.0(4)sr1"
      },
      {
        "model": "unified ip phone 7971g",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "firmware 8.0(4)sr1"
      },
      {
        "model": "skinny client control protocol software",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "8.0\\(4\\)"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001605"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-444"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1072"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:cisco:unified_ip_phone_7911g",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:unified_ip_phone_7941g",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:unified_ip_phone_7961g",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:unified_ip_phone_7970g",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:cisco:unified_ip_phone_7906g",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:cisco:unified_ip_phone_7971g",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001605"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Christian ReichertChristian BlumJens Link",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-444"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2007-1072",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2007-1072",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-24434",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2007-1072",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-1072",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200702-444",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-24434",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24434"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001605"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-444"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1072"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The command line interface (CLI) in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G, with firmware 8.0(4)SR1 and earlier allows local users to obtain privileges or cause a denial of service via unspecified vectors.  NOTE: this issue can be leveraged remotely via CVE-2007-1063. The problem is CVE-2007-1063 It is a problem that can be attacked remotely via.Authorization and denial of service by local user (DoS) There is a possibility of being put into a state. Unified Ip Phone 7970G is prone to a denial-of-service vulnerability. The CLI in several Cisco products is vulnerable to permissions and access control issues. The vulnerability stems from the lack of effective permissions and access control measures in network systems or products. \n\n----------------------------------------------------------------------\n\nSecunia is proud to announce the availability of the Secunia Software\nInspector. \n\nThe Secunia Software Inspector is a free service that detects insecure\nversions of software that you may have installed in your system. When\ninsecure versions are detected, the Secunia Software Inspector also\nprovides thorough guidelines for updating the software to the latest\nsecure version from the vendor. \n\nTry it out online:\nhttp://secunia.com/software_inspector/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco Unified IP Conference Station / IP Phone Default Accounts\n\nSECUNIA ADVISORY ID:\nSA24262\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/24262/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSecurity Bypass\n\nWHERE:\n\u003eFrom local network\n\nOPERATING SYSTEM:\nCisco Unified IP Conference Station 7936\nhttp://secunia.com/product/13540/\nCisco Unified IP Conference Station 7935\nhttp://secunia.com/product/13541/\nCisco Unified IP Phones 7900 Series\nhttp://secunia.com/product/13543/\n\nDESCRIPTION:\nSome security issues have been reported in Cisco Unified IP\nConference Station and IP Phones, which can be exploited by malicious\npeople to access a vulnerable device. \n\n1) A design error in way the administrative HTTP interface of Cisco\nUnified IP Conference Station handles the state of administrator\nlogin sessions can be exploited to bypass the user authentication by\naccessing management URLs directly. \n\nSOLUTION:\nUpdate to a fixed version (see the vendor\u0027s advisory for details). \n\nPROVIDED AND/OR DISCOVERED BY:\n1) The vendor credits Christian Reichert, Christian Blum, and Jens\nLink of Intact Integrated Services. \n2) Reported by the vendor. \n\nORIGINAL ADVISORY:\nCisco Systems:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml\nhttp://www.cisco.com/warp/public/707/cisco-air-20070221-phone.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1072"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001605"
      },
      {
        "db": "BID",
        "id": "81909"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24434"
      },
      {
        "db": "PACKETSTORM",
        "id": "54564"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-1072",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "22647",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "24262",
        "trust": 1.8
      },
      {
        "db": "OSVDB",
        "id": "33064",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001605",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-444",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "81909",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-24434",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "54564",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24434"
      },
      {
        "db": "BID",
        "id": "81909"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001605"
      },
      {
        "db": "PACKETSTORM",
        "id": "54564"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-444"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1072"
      }
    ]
  },
  "id": "VAR-200702-0472",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24434"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T22:28:22.019000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20070221-phone",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20070221-phone"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001605"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24434"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1072"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml"
      },
      {
        "trust": 2.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-air-20070221-phone.shtml"
      },
      {
        "trust": 2.0,
        "url": "http://www.securityfocus.com/bid/22647"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/33064"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/24262"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1072"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1072"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13540/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/software_inspector/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/24262/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13541/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13543/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24434"
      },
      {
        "db": "BID",
        "id": "81909"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001605"
      },
      {
        "db": "PACKETSTORM",
        "id": "54564"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-444"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1072"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-24434"
      },
      {
        "db": "BID",
        "id": "81909"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001605"
      },
      {
        "db": "PACKETSTORM",
        "id": "54564"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-444"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1072"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-02-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-24434"
      },
      {
        "date": "2007-02-22T00:00:00",
        "db": "BID",
        "id": "81909"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001605"
      },
      {
        "date": "2007-02-23T02:32:16",
        "db": "PACKETSTORM",
        "id": "54564"
      },
      {
        "date": "2007-02-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200702-444"
      },
      {
        "date": "2007-02-22T22:28:00",
        "db": "NVD",
        "id": "CVE-2007-1072"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-05-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-24434"
      },
      {
        "date": "2007-02-22T00:00:00",
        "db": "BID",
        "id": "81909"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001605"
      },
      {
        "date": "2019-05-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200702-444"
      },
      {
        "date": "2024-11-21T00:27:26.497000",
        "db": "NVD",
        "id": "CVE-2007-1072"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "81909"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-444"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Unified IP Phone 7906G Service disruption in  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001605"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control issues",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-444"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.