ID

VAR-201409-0390


CVE

CVE-2014-3360


TITLE

Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-004406

DESCRIPTION

Cisco IOS 12.4 and 15.0 through 15.4 and IOS XE 3.1.xS, 3.2.xS, 3.3.xS, 3.4.xS, 3.5.xS, 3.6.xS, and 3.7.xS before 3.7.6S; 3.8.xS, 3.9.xS, and 3.10.xS before 3.10.1S; and 3.11.xS before 3.12S allow remote attackers to cause a denial of service (device reload) via a crafted SIP message, aka Bug ID CSCul46586. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. This issue is being tracked by Cisco Bug ID CSCul46586. The following products and versions are affected: Cisco IOS Release 15.0 through 15.4, IOS XE prior to 3.7.6S Release 3.1.xS, Release 3.2.xS, Release 3.3.xS, Release 3.4.xS, Release 3.5.xS, Release 3.6.xS and 3.7.xS, 3.8.xS before 3.10.1S, 3.9.xS and 3.10.xS, 3.11.xS before 3.12S

Trust: 2.52

sources: NVD: CVE-2014-3360 // JVNDB: JVNDB-2014-004406 // CNVD: CNVD-2014-06437 // BID: 70141 // VULHUB: VHN-71300

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-06437

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.3.3s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.2.2s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7\(4\)s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.1.3s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.3.1s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.2.0s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.3.0s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.3.2s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.4.0s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.2.1s

Trust: 1.6

vendor:ciscomodel:ios 15.2 gcscope: - version: -

Trust: 1.2

vendor:ciscomodel:ios xescope:eqversion:3.7\(0\)s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.5s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7\(5\)s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s\(.0\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7\(1\)as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7\(3\)s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7\(2\)s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.0s

Trust: 1.0

vendor:ciscomodel:ios 15.1 t3scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.2 tscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.2 gc1scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.1 t4scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.1 t1scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.2 t1scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.2 t3scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.2 t2scope: - version: -

Trust: 0.9

vendor:ciscomodel:iosscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xescope: - version: -

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.0-15.4

Trust: 0.6

vendor:ciscomodel:ios xe softwarescope:eqversion:3.x

Trust: 0.6

vendor:ciscomodel:ios 15.1 gcscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.4 t5scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.4 t4scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.4 gc1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.3 t2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 t2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.3 t1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.4 tscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.4 t3scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 gc1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.3 tscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 tscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.3 t3scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.4 t2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.4 t8scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m9scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m3ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xb3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m10scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 yb8scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 xa1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 cgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xb2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 t4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xb7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 xa5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 yb7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 ya1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 t5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 gc4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 t4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m8scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 gc5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t9scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4cgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1xbscope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation stratixscope:neversion:590015.6.3

Trust: 0.3

vendor:ciscomodel:ios 15.2 m5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t11scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 gc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m8scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 ya2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 t3ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t10scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 xa2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xb5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 gca1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 yb1scope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation stratixscope:eqversion:59000

Trust: 0.3

vendor:ciscomodel:ios 15.0 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xb4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 yb3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 yb5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 gc1ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 ya3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xb1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 gc3ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 gc3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2gcascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 gc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xb8ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 t2ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xb6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 gcascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 xa3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xb5ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 xb10scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 yb6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 yb4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 m3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 yb2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m0bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m7scope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2014-06437 // BID: 70141 // JVNDB: JVNDB-2014-004406 // CNNVD: CNNVD-201409-963 // NVD: CVE-2014-3360

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3360
value: HIGH

Trust: 1.0

NVD: CVE-2014-3360
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-06437
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201409-963
value: HIGH

Trust: 0.6

VULHUB: VHN-71300
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-3360
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-06437
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-71300
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-06437 // VULHUB: VHN-71300 // JVNDB: JVNDB-2014-004406 // CNNVD: CNNVD-201409-963 // NVD: CVE-2014-3360

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-71300 // JVNDB: JVNDB-2014-004406 // NVD: CVE-2014-3360

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201409-963

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201409-963

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-004406

PATCH

title:35259url:http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=35259

Trust: 0.8

title:cisco-sa-20140924-sipurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-sip

Trust: 0.8

title:35611url:http://tools.cisco.com/security/center/viewAlert.x?alertId=35611

Trust: 0.8

title:Patch for Cisco IOS and IOS XE Software Denial of Service Vulnerability (CNVD-2014-06437)url:https://www.cnvd.org.cn/patchInfo/show/50429

Trust: 0.6

sources: CNVD: CNVD-2014-06437 // JVNDB: JVNDB-2014-004406

EXTERNAL IDS

db:NVDid:CVE-2014-3360

Trust: 3.4

db:BIDid:70141

Trust: 2.0

db:SECTRACKid:1030897

Trust: 1.1

db:JVNDBid:JVNDB-2014-004406

Trust: 0.8

db:CNNVDid:CNNVD-201409-963

Trust: 0.7

db:CNVDid:CNVD-2014-06437

Trust: 0.6

db:ICS CERTid:ICSA-17-094-04

Trust: 0.3

db:VULHUBid:VHN-71300

Trust: 0.1

sources: CNVD: CNVD-2014-06437 // VULHUB: VHN-71300 // BID: 70141 // JVNDB: JVNDB-2014-004406 // CNNVD: CNNVD-201409-963 // NVD: CVE-2014-3360

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140924-sip

Trust: 2.0

url:http://www.securityfocus.com/bid/70141

Trust: 1.7

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140924-sip/cvrf/cisco-sa-20140924-sip_cvrf.xml

Trust: 1.7

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3360

Trust: 1.4

url:http://www.securitytracker.com/id/1030897

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/96174

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3360

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=35611

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-094-04

Trust: 0.3

sources: CNVD: CNVD-2014-06437 // VULHUB: VHN-71300 // BID: 70141 // JVNDB: JVNDB-2014-004406 // CNNVD: CNNVD-201409-963 // NVD: CVE-2014-3360

CREDITS

Cisco

Trust: 0.3

sources: BID: 70141

SOURCES

db:CNVDid:CNVD-2014-06437
db:VULHUBid:VHN-71300
db:BIDid:70141
db:JVNDBid:JVNDB-2014-004406
db:CNNVDid:CNNVD-201409-963
db:NVDid:CVE-2014-3360

LAST UPDATE DATE

2024-11-23T20:12:30.573000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-06437date:2014-09-28T00:00:00
db:VULHUBid:VHN-71300date:2017-08-29T00:00:00
db:BIDid:70141date:2017-05-23T16:24:00
db:JVNDBid:JVNDB-2014-004406date:2014-09-26T00:00:00
db:CNNVDid:CNNVD-201409-963date:2014-09-26T00:00:00
db:NVDid:CVE-2014-3360date:2024-11-21T02:07:56.390

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-06437date:2014-09-28T00:00:00
db:VULHUBid:VHN-71300date:2014-09-25T00:00:00
db:BIDid:70141date:2014-09-24T00:00:00
db:JVNDBid:JVNDB-2014-004406date:2014-09-26T00:00:00
db:CNNVDid:CNNVD-201409-963date:2014-09-26T00:00:00
db:NVDid:CVE-2014-3360date:2014-09-25T10:55:08.683