Show plain JSON{"id": "CVE-2017-6664", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2017-08-07T06:29:00.263", "references": [{"url": "http://www.securityfocus.com/bid/99986", "tags": ["Third Party Advisory", "VDB Entry"], "source": "ykramarz@cisco.com"}, {"url": "http://www.securitytracker.com/id/1038997", "tags": ["Third Party Advisory", "VDB Entry"], "source": "ykramarz@cisco.com"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anicrl", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-295"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the Autonomic Networking feature of Cisco IOS XE Software could allow an unauthenticated, remote, autonomic node to access the Autonomic Networking infrastructure of an affected system, after the certificate for the autonomic node has been revoked. This vulnerability affected devices that are running Release 16.x of Cisco IOS XE Software and are configured to use Autonomic Networking. This vulnerability does not affect devices that are running an earlier release of Cisco IOS XE Software or devices that are not configured to use Autonomic Networking. More Information: CSCvd22328. Known Affected Releases: 15.5(1)S3.1 Denali-16.2.1."}, {"lang": "es", "value": "Microsoft Edge en Microsoft Windows 10 1703 permite que un atacante ejecute c\u00f3digo arbitrario en el contexto del usuario actual debido a la forma en la que los motores JavaScript del navegador de Microsoft renderizan contenido cuando gestionan objetos en la memoria. Esto tambi\u00e9n se conoce como \"Scripting Engine Memory Corruption Vulnerability\". Este ID CVE es exclusivo de CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, y CVE-2017-8674."}], "lastModified": "2019-10-03T00:03:26.223", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A4142E2-B8A8-4E78-B4ED-52F63C43C6F0"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7DA3731-E719-4DB7-9783-1C00481141EB"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "503EFE9E-C238-46BA-8CA3-DE8D5DDB9A2D"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "278ACF0A-949B-486D-8F6C-ADC2AF25FC17"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37A30BA4-D760-4321-AAC8-04093AAAEA3E"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42616EA2-DDCF-4B57-BF2A-37968C82DDC6"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C01C1D8-A191-45B7-A6C5-EE225F05A49E"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E50FF89-8E71-4EA0-9AEC-2F800ED9D995"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E70C455-E41C-4B17-847A-5F4281139252"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64A07329-3A7D-4483-AE69-4786FEB23D92"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14B39732-D8FA-4E08-95FC-8F26C0BF8D0E"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C"}], "operator": "OR"}]}], "sourceIdentifier": "ykramarz@cisco.com"}