var-201707-0956
Vulnerability from variot
A vulnerability in Cisco WebEx browser extensions for Google Chrome and Mozilla Firefox could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server, Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center), and Cisco WebEx Meetings when they are running on Microsoft Windows. The vulnerability is due to a design defect in the extension. An attacker who can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser. The following versions of the Cisco WebEx browser extensions are affected: Versions prior to 1.0.12 of the Cisco WebEx extension on Google Chrome, Versions prior to 1.0.12 of the Cisco WebEx extension on Mozilla Firefox. Cisco Bug IDs: CSCvf15012 CSCvf15020 CSCvf15030 CSCvf15033 CSCvf15036 CSCvf15037. plural Cisco WebEx The product contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvf15012 , CSCvf15020 , CSCvf15030 , CSCvf15033 , CSCvf15036 ,and CSCvf15037 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Google Chrome for Windows is a Windows-based web browser developed by Google (Google). Mozilla Firefox for Windows is an open source web browser based on the Windows platform from the Mozilla Foundation of the United States
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201707-0956", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webex meetings", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "t30_base" }, { "model": "webex meetings server 2.5 mr6 patch", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "2.6.1.39" }, { "model": "webex event center", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "t31_base" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "2.5.1.29" }, { "model": "webex meetings server 2.5", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "mr1" }, { "model": "webex meetings server 2.7 mr1 patch", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1" }, { "model": "webex meetings server 2.0 mr9 patch", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1" }, { "model": "webex meetings server 2.5", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "mr5" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "2.8_base" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.5.99.2" }, { "model": "webex meeting center", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "t31_base" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5_base" }, { "model": "webex meetings server 2.7 mr2 patch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1" }, { "model": "webex training center", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "t31_base" }, { "model": "webex meetings server 2.0 mr9 patch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3" }, { "model": "webex meetings server 2.0", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr9" }, { "model": "webex meetings server 2.5 mr2 patch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1" }, { "model": "webex meetings server 2.0", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr5" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.0.1.107" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.0_base" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.7.1" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.7_base" }, { "model": "webex meetings server 2.6", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr2" }, { "model": "webex meetings server 2.0", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr8" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5.1.6" }, { "model": "webex meeting center", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "t30_base" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.5.1.5" }, { "model": "webex training center", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "t30_base" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.1_base" }, { "model": "webex meetings server 2.6", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr1" }, { "model": "webex meeting center", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "t32_base" }, { "model": "webex meetings server 2.6 mr1 patch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1" }, { "model": "webex meetings server 2.6 mr3 patch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1" }, { "model": "webex training center", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "t32_base" }, { "model": "webex meetings server 2.0 mr8 patch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1" }, { "model": "webex support center", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "t31_base" }, { "model": "webex meetings server 2.6 mr3 patch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2" }, { "model": "webex meetings server 2.0 mr9 patch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2" }, { "model": "webex meetings server 2.5 mr6 patch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3" }, { "model": "webex meetings server 2.0", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr6" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.5_base" }, { "model": "webex meetings server 2.0", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr2" }, { "model": "webex meetings server 2.0", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr7" }, { "model": "webex meetings server 2.5", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr2" }, { "model": "webex meetings server 2.6", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr3" }, { "model": "webex meetings server 2.7", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr1" }, { "model": "webex meetings server 2.5", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr6" }, { "model": "webex meetings server 2.6 mr2 patch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1" }, { "model": "webex meetings server 2.0", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr4" }, { "model": "webex support center", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "t30_base" }, { "model": "webex meetings server 2.5 mr6 patch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4" }, { "model": "webex meetings server 2.5", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr4" }, { "model": "webex event center", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "t30_base" }, { "model": "webex event center", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "t32_base" }, { "model": "webex support center", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "t32_base" }, { "model": "webex meetings server 2.5 mr6 patch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2" }, { "model": "webex meetings server 2.0", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr3" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.6.0" }, { "model": "webex meetings server 2.5 mr5 patch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1" }, { "model": "webex meetings server 2.7", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr2" }, { "model": "webex meetings server 2.5", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "mr3" }, { "model": "webex meetings server", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5.1.131" }, { "model": "webex event center", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "webex meeting center", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "webex meetings", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "webex meetings server", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "webex support center", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "webex training center", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "webex meetings server t29 orion merge", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.8" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.7" }, { "model": "webex meetings t32", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "webex meetings t31", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "webex meetings t30", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "webex meetings t29", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "webex extension", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0.9" }, { "model": "webex extension", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0.5" }, { "model": "webex extension", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0.3" }, { "model": "webex extension", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0.2" }, { "model": "webex extension", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1.0.12" } ], "sources": [ { "db": "BID", "id": "99614" }, { "db": "JVNDB", "id": "JVNDB-2017-006452" }, { "db": "CNNVD", "id": "CNNVD-201707-864" }, { "db": "NVD", "id": "CVE-2017-6753" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:webex_event_center", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:webex_meeting_center", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:webex_meetings", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:webex_meetings_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:webex_support_center", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:webex_training_center", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-006452" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tavis Ormandy of Google Project Zero and Cris Neckar of Divergent Security.", "sources": [ { "db": "BID", "id": "99614" }, { "db": "CNNVD", "id": "CNNVD-201707-864" } ], "trust": 0.9 }, "cve": "CVE-2017-6753", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2017-6753", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-114956", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2017-6753", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-6753", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-6753", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201707-864", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-114956", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-114956" }, { "db": "JVNDB", "id": "JVNDB-2017-006452" }, { "db": "CNNVD", "id": "CNNVD-201707-864" }, { "db": "NVD", "id": "CVE-2017-6753" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in Cisco WebEx browser extensions for Google Chrome and Mozilla Firefox could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server, Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center), and Cisco WebEx Meetings when they are running on Microsoft Windows. The vulnerability is due to a design defect in the extension. An attacker who can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser. The following versions of the Cisco WebEx browser extensions are affected: Versions prior to 1.0.12 of the Cisco WebEx extension on Google Chrome, Versions prior to 1.0.12 of the Cisco WebEx extension on Mozilla Firefox. Cisco Bug IDs: CSCvf15012 CSCvf15020 CSCvf15030 CSCvf15033 CSCvf15036 CSCvf15037. plural Cisco WebEx The product contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvf15012 , CSCvf15020 , CSCvf15030 , CSCvf15033 , CSCvf15036 ,and CSCvf15037 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Google Chrome for Windows is a Windows-based web browser developed by Google (Google). Mozilla Firefox for Windows is an open source web browser based on the Windows platform from the Mozilla Foundation of the United States", "sources": [ { "db": "NVD", "id": "CVE-2017-6753" }, { "db": "JVNDB", "id": "JVNDB-2017-006452" }, { "db": "BID", "id": "99614" }, { "db": "VULHUB", "id": "VHN-114956" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-6753", "trust": 2.8 }, { "db": "BID", "id": "99614", "trust": 2.0 }, { "db": "SECTRACK", "id": "1038911", "trust": 1.7 }, { "db": "SECTRACK", "id": "1038910", "trust": 1.7 }, { "db": "SECTRACK", "id": "1038909", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2017-006452", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201707-864", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-114956", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-114956" }, { "db": "BID", "id": "99614" }, { "db": "JVNDB", "id": "JVNDB-2017-006452" }, { "db": "CNNVD", "id": "CNNVD-201707-864" }, { "db": "NVD", "id": "CVE-2017-6753" } ] }, "id": "VAR-201707-0956", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-114956" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T23:12:25.355000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20170717-webex", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170717-webex" }, { "title": "Google Chrome and Mozilla firefox for Windows Cisco WebEx Browser Extension Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=71852" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-006452" }, { "db": "CNNVD", "id": "CNNVD-201707-864" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-114956" }, { "db": "JVNDB", "id": "JVNDB-2017-006452" }, { "db": "NVD", "id": "CVE-2017-6753" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170717-webex" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/99614" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1038909" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1038910" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1038911" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6753" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6753" }, { "trust": 0.3, "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1324\u0026can=1\u0026q=\u0026sort=-id\u0026colspec=id%20status%20owner%20summary%20modified%20cve\u0026desc=2" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-114956" }, { "db": "BID", "id": "99614" }, { "db": "JVNDB", "id": "JVNDB-2017-006452" }, { "db": "CNNVD", "id": "CNNVD-201707-864" }, { "db": "NVD", "id": "CVE-2017-6753" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-114956" }, { "db": "BID", "id": "99614" }, { "db": "JVNDB", "id": "JVNDB-2017-006452" }, { "db": "CNNVD", "id": "CNNVD-201707-864" }, { "db": "NVD", "id": "CVE-2017-6753" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-25T00:00:00", "db": "VULHUB", "id": "VHN-114956" }, { "date": "2017-07-17T00:00:00", "db": "BID", "id": "99614" }, { "date": "2017-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-006452" }, { "date": "2017-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201707-864" }, { "date": "2017-07-25T19:29:00.397000", "db": "NVD", "id": "CVE-2017-6753" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-114956" }, { "date": "2017-07-17T00:00:00", "db": "BID", "id": "99614" }, { "date": "2017-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-006452" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201707-864" }, { "date": "2024-11-21T03:30:27.107000", "db": "NVD", "id": "CVE-2017-6753" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201707-864" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco WebEx Product buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-006452" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201707-864" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.