VAR-200512-0144

Vulnerability from variot - Updated: 2025-04-03 22:33

Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service or upload files via direct requests to obsolete JSP files including (1) admin/uploadclient.jsp, (2) apply_firmware_action.jsp, and (3) file.jsp. Cisco Clean Access is prone to a vulnerability that could allow unauthorized users to access various Web server JSP pages. This could allow an attacker to upload unauthorized data, cause denial of service issues, and possibly take unauthorized actions through accessing inappropriate JSP pages. Cisco Clean Access version 3.5.5 is reported vulnerable; prior versions may also be affected. Cisco has stated that this issue is being tracked by bug ID CSCsc85405. Similar issues exist in apply_firmware_action.jsp and file.jsp.

The vulnerability is caused due to missing authentication on several obsolete JSP files (e.g. "/admin/uploadclient.jsp", "apply_firmware_action.jsp" and "file.jsp") that is present on the Secure Smart Manager. This can be exploited to upload files onto the affected system without requiring authentication, potentially to cause a DoS by filling up the disk space.

The vulnerability has been reported in 3.5.5. Other versions may also be affected.

SOLUTION: Apply patch. http://www.cisco.com/pcgi-bin/tablebuild.pl/cca-patches?psrtdcat20e2

PROVIDED AND/OR DISCOVERED BY: Alex Lanstein

ORIGINAL ADVISORY: CISCO: http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml

Alex Lanstein: http://www.awarenetwork.org/forum/viewtopic.php?p=2236


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200512-0144",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.5.1"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.3.8"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.3.7"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.3"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.3.4"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.4.5"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.3.5"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.4.1"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.5.4"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.5"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.5.3"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.3.6"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.3.1"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.5.2"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.5.5"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.3.2"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.3.3"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.3.9"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.4.4"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.4"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.4.2"
      },
      {
        "model": "network admission control manager and server system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.4.3"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.3.9"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.3.8"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.3.7"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.3.6"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.3.5"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.3.4"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.3.3"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.3.2"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.3.1"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.3"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.5.5"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.5.4"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.5.3"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.5.2"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.5.1"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.5"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.4.5"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.4.4"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.4.3"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.4.2"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.4.1"
      },
      {
        "model": "clean access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.4"
      },
      {
        "model": "clean access",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.6.0.1"
      },
      {
        "model": "clean access",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.5(9)"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "15909"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-366"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-4332"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Alex Lanstein  alex@box.sk",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-366"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2005-4332",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2005-4332",
            "impactScore": 9.2,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-15540",
            "impactScore": 9.2,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2005-4332",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200512-366",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-15540",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-15540"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-366"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-4332"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service or upload files via direct requests to obsolete JSP files including (1) admin/uploadclient.jsp, (2) apply_firmware_action.jsp, and (3) file.jsp. Cisco Clean Access is prone to a vulnerability that could allow unauthorized users to access various Web server JSP pages. \nThis could allow an attacker to upload unauthorized data, cause denial of service issues, and possibly take unauthorized actions through accessing inappropriate JSP pages. \nCisco Clean Access version 3.5.5 is reported vulnerable; prior versions may also be affected. \nCisco has stated that this issue is being tracked by bug ID CSCsc85405. Similar issues exist in apply_firmware_action.jsp and file.jsp. \n\nThe vulnerability is caused due to missing authentication on several\nobsolete JSP files (e.g. \"/admin/uploadclient.jsp\",\n\"apply_firmware_action.jsp\" and \"file.jsp\") that is present on the\nSecure Smart Manager. This can be exploited to upload files onto the\naffected system without requiring authentication, potentially to\ncause a DoS by filling up the disk space. \n\nThe vulnerability has been reported in 3.5.5. Other versions may also\nbe affected. \n\nSOLUTION:\nApply patch. \nhttp://www.cisco.com/pcgi-bin/tablebuild.pl/cca-patches?psrtdcat20e2\n\nPROVIDED AND/OR DISCOVERED BY:\nAlex Lanstein\n\nORIGINAL ADVISORY:\nCISCO:\nhttp://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml\n\nAlex Lanstein:\nhttp://www.awarenetwork.org/forum/viewtopic.php?p=2236\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-4332"
      },
      {
        "db": "BID",
        "id": "15909"
      },
      {
        "db": "VULHUB",
        "id": "VHN-15540"
      },
      {
        "db": "PACKETSTORM",
        "id": "42497"
      }
    ],
    "trust": 1.35
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "15909",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "18103",
        "trust": 1.8
      },
      {
        "db": "NVD",
        "id": "CVE-2005-4332",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1015375",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "21956",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "21958",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "21957",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2005-3007",
        "trust": 1.7
      },
      {
        "db": "SREASON",
        "id": "265",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-366",
        "trust": 0.7
      },
      {
        "db": "BUGTRAQ",
        "id": "20051221 CISCO SECURITY RESPONSE: DOS IN CISCO CLEAN ACCESS",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20051216 DOS IN CISCO CLEAN ACCESS",
        "trust": 0.6
      },
      {
        "db": "CISCO",
        "id": "20051221 RESPONSE TO DOS IN CISCO CLEAN ACCESS",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-15540",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "42497",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-15540"
      },
      {
        "db": "BID",
        "id": "15909"
      },
      {
        "db": "PACKETSTORM",
        "id": "42497"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-366"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-4332"
      }
    ]
  },
  "id": "VAR-200512-0144",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-15540"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T22:33:01.148000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-4332"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-cca.shtml"
      },
      {
        "trust": 1.8,
        "url": "http://www.awarenetwork.org/forum/viewtopic.php?p=2236"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/15909"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/21956"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/21957"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/21958"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1015375"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/18103"
      },
      {
        "trust": 1.7,
        "url": "http://securityreason.com/securityalert/265"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/419645/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/420008/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2005/3007"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/420008/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/419645/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2005/3007"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/en/us/products/ps6128/index.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/420008"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/419645"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/18103/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/5561/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/cca-patches?psrtdcat20e2"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-15540"
      },
      {
        "db": "BID",
        "id": "15909"
      },
      {
        "db": "PACKETSTORM",
        "id": "42497"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-366"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-4332"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-15540"
      },
      {
        "db": "BID",
        "id": "15909"
      },
      {
        "db": "PACKETSTORM",
        "id": "42497"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-366"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-4332"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-12-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-15540"
      },
      {
        "date": "2005-12-16T00:00:00",
        "db": "BID",
        "id": "15909"
      },
      {
        "date": "2005-12-23T08:37:20",
        "db": "PACKETSTORM",
        "id": "42497"
      },
      {
        "date": "2005-12-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200512-366"
      },
      {
        "date": "2005-12-17T11:03:00",
        "db": "NVD",
        "id": "CVE-2005-4332"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-15540"
      },
      {
        "date": "2005-12-16T00:00:00",
        "db": "BID",
        "id": "15909"
      },
      {
        "date": "2006-01-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200512-366"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2005-4332"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-366"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Clean Access Multiple JSP Page access validation vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-366"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "access verification error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-366"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…