var-201605-0413
Vulnerability from variot
Cisco IOS XR through 5.3.2 mishandles Local Packet Transport Services (LPTS) flow-base entries, which allows remote attackers to cause a denial of service (session drop) by making many connection attempts to open TCP ports, aka Bug ID CSCux95576. Cisco IOSXR for Cisco ASR9000 Series Aggregation Services Routers is an operating system running on 9000 Series routers. Cisco IOS XR is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition; denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCux95576
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0413", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.0.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.0.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "3.8.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1_base" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.2.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.0.3" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "3.8.3" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2.50" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1.1.k9sec" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2.4" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7_base" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.4.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.8.4" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.4.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.3.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.8.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.3.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.4.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.3.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.5.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2.3" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.4.3" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.3.3" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1.3" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.3.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.3.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.3.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2.5" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.3.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.3.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0_base" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2.6" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.4" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.11" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2.4" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.0.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.5.3" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.5.4" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.3.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.3.4" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.9.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.3.3" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.8.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.3.4" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.3" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.3" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.0.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.0.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2.3" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.5.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6_base" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.9.3" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.9.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0_base" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.9.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2.4" }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2.3" }, { "model": "ios xr", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "5.3.2" }, { "model": "ios xr lpts", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03405" }, { "db": "JVNDB", "id": "JVNDB-2016-002929" }, { "db": "CNNVD", "id": "CNNVD-201605-545" }, { "db": "NVD", "id": "CVE-2016-1407" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:cisco:ios_xr", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002929" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "90776" } ], "trust": 0.3 }, "cve": "CVE-2016-1407", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2016-1407", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-03405", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-90226", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2016-1407", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-1407", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-1407", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-03405", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201605-545", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-90226", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03405" }, { "db": "VULHUB", "id": "VHN-90226" }, { "db": "JVNDB", "id": "JVNDB-2016-002929" }, { "db": "CNNVD", "id": "CNNVD-201605-545" }, { "db": "NVD", "id": "CVE-2016-1407" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IOS XR through 5.3.2 mishandles Local Packet Transport Services (LPTS) flow-base entries, which allows remote attackers to cause a denial of service (session drop) by making many connection attempts to open TCP ports, aka Bug ID CSCux95576. Cisco IOSXR for Cisco ASR9000 Series Aggregation Services Routers is an operating system running on 9000 Series routers. Cisco IOS XR is prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to cause a denial-of-service condition; denying service to legitimate users. \nThis issue is being tracked by Cisco Bug ID CSCux95576", "sources": [ { "db": "NVD", "id": "CVE-2016-1407" }, { "db": "JVNDB", "id": "JVNDB-2016-002929" }, { "db": "CNVD", "id": "CNVD-2016-03405" }, { "db": "BID", "id": "90776" }, { "db": "VULHUB", "id": "VHN-90226" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1407", "trust": 3.4 }, { "db": "SECTRACK", "id": "1035934", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-002929", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201605-545", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-03405", "trust": 0.6 }, { "db": "BID", "id": "90776", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-90226", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03405" }, { "db": "VULHUB", "id": "VHN-90226" }, { "db": "BID", "id": "90776" }, { "db": "JVNDB", "id": "JVNDB-2016-002929" }, { "db": "CNNVD", "id": "CNNVD-201605-545" }, { "db": "NVD", "id": "CVE-2016-1407" } ] }, "id": "VAR-201605-0413", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-03405" }, { "db": "VULHUB", "id": "VHN-90226" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03405" } ] }, "last_update_date": "2024-11-23T22:30:58.936000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160519-ios-xr", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160519-ios-xr" }, { "title": "Cisco IOSXR for Cisco ASR9000 Series AggregationServicesRouters Denial of Service Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/76258" }, { "title": "Cisco IOS XR for Cisco ASR 9000 Series Aggregation Services Routers Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61859" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03405" }, { "db": "JVNDB", "id": "JVNDB-2016-002929" }, { "db": "CNNVD", "id": "CNNVD-201605-545" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90226" }, { "db": "JVNDB", "id": "JVNDB-2016-002929" }, { "db": "NVD", "id": "CVE-2016-1407" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160519-ios-xr" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035934" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1407" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1407" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/ps5845/index.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03405" }, { "db": "VULHUB", "id": "VHN-90226" }, { "db": "BID", "id": "90776" }, { "db": "JVNDB", "id": "JVNDB-2016-002929" }, { "db": "CNNVD", "id": "CNNVD-201605-545" }, { "db": "NVD", "id": "CVE-2016-1407" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-03405" }, { "db": "VULHUB", "id": "VHN-90226" }, { "db": "BID", "id": "90776" }, { "db": "JVNDB", "id": "JVNDB-2016-002929" }, { "db": "CNNVD", "id": "CNNVD-201605-545" }, { "db": "NVD", "id": "CVE-2016-1407" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-03405" }, { "date": "2016-05-25T00:00:00", "db": "VULHUB", "id": "VHN-90226" }, { "date": "2016-05-19T00:00:00", "db": "BID", "id": "90776" }, { "date": "2016-05-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002929" }, { "date": "2016-05-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-545" }, { "date": "2016-05-25T01:59:10.773000", "db": "NVD", "id": "CVE-2016-1407" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-03405" }, { "date": "2016-12-01T00:00:00", "db": "VULHUB", "id": "VHN-90226" }, { "date": "2016-05-19T00:00:00", "db": "BID", "id": "90776" }, { "date": "2016-06-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002929" }, { "date": "2016-05-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-545" }, { "date": "2024-11-21T02:46:23.070000", "db": "NVD", "id": "CVE-2016-1407" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-545" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IOS XR for Cisco ASR 9000 Series Aggregation Services Routers Denial of Service Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2016-03405" }, { "db": "CNNVD", "id": "CNNVD-201605-545" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-545" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.