VAR-201612-0371
Vulnerability from variot - Updated: 2025-04-13 23:33A vulnerability in TCP processing in Cisco FirePOWER system software could allow an unauthenticated, remote attacker to download files that would normally be blocked. Affected Products: The following Cisco products are vulnerable: Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services, Advanced Malware Protection (AMP) for Networks - 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks - 8000 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, FirePOWER Threat Defense for Integrated Services Routers (ISRs), Next Generation Intrusion Prevention System (NGIPS) for Blue Coat X-Series, Sourcefire 3D System Appliances, Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. More Information: CSCvb20102. Known Affected Releases: 2.9.7.10. Multiple Cisco Products are prone to a security-bypass vulnerability. Successful exploits may allow an attacker to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. This issue is tracked by Cisco Bug ID CSCvb20102. Cisco Firepower System Software is a next-generation firewall product (NGFW) of Cisco (Cisco). TCP is one of the network transport protocols. Remote attackers can use specially crafted HTTP to exploit this vulnerability to trick users into downloading malicious files, bypassing the malicious file protection mechanism
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201612-0371",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "firepower services for adaptive security appliance",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.1.7"
},
{
"model": "firepower services for adaptive security appliance",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.1.4"
},
{
"model": "firepower services for adaptive security appliance",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.1"
},
{
"model": "firepower services for adaptive security appliance",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.0"
},
{
"model": "firepower services for adaptive security appliance",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.1.6"
},
{
"model": "firepower services for adaptive security appliance",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.1.3"
},
{
"model": "firepower services for adaptive security appliance",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.1.0"
},
{
"model": "firepower services for adaptive security appliance",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.4.1.5"
},
{
"model": "firepower services for adaptive security appliance",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0.0"
},
{
"model": "firepower services for adaptive security appliance",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "5.3.0"
},
{
"model": "firepower services for adaptive security appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0.1"
},
{
"model": "firepower services for adaptive security appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.4.1.2"
},
{
"model": "firepower services for adaptive security appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.4.1.1"
},
{
"model": "firepower services for asa",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.3.0"
},
{
"model": "firepower services for asa",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.0"
},
{
"model": "firepower services for asa",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1"
},
{
"model": "firepower services for asa",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1.1"
},
{
"model": "firepower services for asa",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1.2"
},
{
"model": "firepower services for asa",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1.3"
},
{
"model": "firepower services for asa",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1.4"
},
{
"model": "firepower services for asa",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1.5"
},
{
"model": "firepower services for asa",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1.6"
},
{
"model": "firepower services for asa",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1.7"
},
{
"model": "firepower services for asa",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "6.0.0"
},
{
"model": "firepower services for asa",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "6.0.1"
},
{
"model": "firepower services for asa",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "6.1.0"
},
{
"model": "firepower threat defense software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.3.0"
},
{
"model": "firepower threat defense software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.0"
},
{
"model": "firepower threat defense software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1"
},
{
"model": "firepower threat defense software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1.1"
},
{
"model": "firepower threat defense software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1.2"
},
{
"model": "firepower threat defense software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1.3"
},
{
"model": "firepower threat defense software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1.4"
},
{
"model": "firepower threat defense software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1.5"
},
{
"model": "firepower threat defense software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1.6"
},
{
"model": "firepower threat defense software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "5.4.1.7"
},
{
"model": "firepower threat defense software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "6.0.0"
},
{
"model": "firepower threat defense software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "6.0.1"
},
{
"model": "firepower threat defense software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "6.1.0"
},
{
"model": "virtual next-generation intrusion prevention system",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "sourcefire 3d system appliances",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "next generation intrusion prevention system",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "firepower threat defense for integrated services routers",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "firepower system software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "firepower series appliances",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "80000"
},
{
"model": "firepower series appliances",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "70000"
},
{
"model": "advanced malware protection series appliances",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "80000"
},
{
"model": "advanced malware protection series appliances",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "70000"
},
{
"model": "adaptive security appliance series",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5500-x0"
}
],
"sources": [
{
"db": "BID",
"id": "94817"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-006317"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-219"
},
{
"db": "NVD",
"id": "CVE-2016-9209"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:cisco:firepower_services_software_for_asa",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:cisco:firepower_threat_defense_software",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-006317"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "94817"
}
],
"trust": 0.3
},
"cve": "CVE-2016-9209",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2016-9209",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-98029",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"id": "CVE-2016-9209",
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-9209",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2016-9209",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201612-219",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-98029",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98029"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-006317"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-219"
},
{
"db": "NVD",
"id": "CVE-2016-9209"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability in TCP processing in Cisco FirePOWER system software could allow an unauthenticated, remote attacker to download files that would normally be blocked. Affected Products: The following Cisco products are vulnerable: Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services, Advanced Malware Protection (AMP) for Networks - 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks - 8000 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, FirePOWER Threat Defense for Integrated Services Routers (ISRs), Next Generation Intrusion Prevention System (NGIPS) for Blue Coat X-Series, Sourcefire 3D System Appliances, Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. More Information: CSCvb20102. Known Affected Releases: 2.9.7.10. Multiple Cisco Products are prone to a security-bypass vulnerability. \nSuccessful exploits may allow an attacker to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. \nThis issue is tracked by Cisco Bug ID CSCvb20102. Cisco Firepower System Software is a next-generation firewall product (NGFW) of Cisco (Cisco). TCP is one of the network transport protocols. Remote attackers can use specially crafted HTTP to exploit this vulnerability to trick users into downloading malicious files, bypassing the malicious file protection mechanism",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9209"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-006317"
},
{
"db": "BID",
"id": "94817"
},
{
"db": "VULHUB",
"id": "VHN-98029"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-9209",
"trust": 2.8
},
{
"db": "BID",
"id": "94817",
"trust": 1.4
},
{
"db": "JVNDB",
"id": "JVNDB-2016-006317",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201612-219",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-98029",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98029"
},
{
"db": "BID",
"id": "94817"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-006317"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-219"
},
{
"db": "NVD",
"id": "CVE-2016-9209"
}
]
},
"id": "VAR-201612-0371",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-98029"
}
],
"trust": 0.66915015
},
"last_update_date": "2025-04-13T23:33:55.839000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20161207-fpwr",
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-fpwr"
},
{
"title": "Cisco Firepower System Software Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66257"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-006317"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-219"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-254",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98029"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-006317"
},
{
"db": "NVD",
"id": "CVE-2016-9209"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161207-fpwr"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/94817"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9209"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9209"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98029"
},
{
"db": "BID",
"id": "94817"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-006317"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-219"
},
{
"db": "NVD",
"id": "CVE-2016-9209"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-98029"
},
{
"db": "BID",
"id": "94817"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-006317"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-219"
},
{
"db": "NVD",
"id": "CVE-2016-9209"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-14T00:00:00",
"db": "VULHUB",
"id": "VHN-98029"
},
{
"date": "2016-12-07T00:00:00",
"db": "BID",
"id": "94817"
},
{
"date": "2016-12-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-006317"
},
{
"date": "2016-12-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-219"
},
{
"date": "2016-12-14T00:59:30.803000",
"db": "NVD",
"id": "CVE-2016-9209"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-15T00:00:00",
"db": "VULHUB",
"id": "VHN-98029"
},
{
"date": "2016-12-20T01:08:00",
"db": "BID",
"id": "94817"
},
{
"date": "2016-12-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-006317"
},
{
"date": "2016-12-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-219"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-9209"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-219"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco FirePOWER System software TCP Vulnerabilities in files that are normally blocked in the process of downloading",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-006317"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-219"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.