Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F24CCD0-DFAB-44D9-B29A-A6D925A83C93", "vulnerable": false}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.0-000:*:*:*:*:*:*:*", "matchCriteriaId": "33C867BF-2CD0-4058-9738-22C769B03D97", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AFBF729F-2AD0-4291-AF41-184CCA230D28", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "9D8750D2-5250-43BE-AC50-981902C0CF5C", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.6-078:*:*:*:*:*:*:*", "matchCriteriaId": "A5A171CD-A1FB-44AE-B252-9916626AEEDD", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.6-119:*:*:*:*:*:*:*", "matchCriteriaId": "D6003553-A114-42E0-B817-D176F3A6112B", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "892F3569-985A-43FD-8A65-440A528A29FD", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.7-142:*:*:*:*:*:*:*", "matchCriteriaId": "7514E1C3-42DC-4738-AF6C-3004FAC5BD6C", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.8-mr-113:*:*:*:*:*:*:*", "matchCriteriaId": "C62AB23C-9F58-403D-B0E7-8ED3F5A4FE1B", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.0-000:*:*:*:*:*:*:*", "matchCriteriaId": "7D725328-3720-4C45-BF53-295A70BFCD92", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.0-497:*:*:*:*:*:*:*", "matchCriteriaId": "3E9AF842-92F9-43A7-834A-0FFB3B619EDA", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.1-021:*:*:*:*:*:*:*", "matchCriteriaId": "8C75625C-3C19-4449-B992-279325170CD2", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.2-024:*:*:*:*:*:*:*", "matchCriteriaId": "4954BDC0-0A4B-4EF7-BFD2-2FF6FAE2FCA4", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.2-027:*:*:*:*:*:*:*", "matchCriteriaId": "F4F98B8B-8B27-4253-B8EF-5782F57DB654", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.3-055:*:*:*:*:*:*:*", "matchCriteriaId": "729E3778-4BCA-46C6-AF3D-A2C10CDDB1F1", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cisco AsyncOS 8.0 before 8.0.6-119 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (proxy-process hang) via a crafted HTTP POST request, aka Bug ID CSCuo12171."}, {"lang": "es", "value": "Cisco AsyncOS 8.0 en versiones anteriores a 8.0.6-119 en dispositivos Web Security Appliance (WSA) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (colgado del proceso proxy) a trav\u00e9s de una petici\u00f3n HTTP POST manipulada, tambi\u00e9n conocida como Bug ID CSCuo12171."}], "id": "CVE-2016-1380", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2016-05-25T01:59:04.020", "references": [{"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa1"}, {"source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1035908"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035908"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}