Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:snapgear:560:1.7.8_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "2CE2340F-9228-4491-BD18-237518BE8883", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:560:1.7.9_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "A8F6607D-ACA3-4D08-940D-2CE3B4BDBDF9", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:560:1.7.10_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "A428A676-006B-4313-8D1E-7281E87152DA", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:560:1.8.4_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "69C18664-B609-460B-84EB-3A79EE5D9AB3", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:560:1.8.5_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "F292707F-180B-493B-AA5D-0DC6ABF86E05", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:560:1.8_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "0F8BD2FF-8D2E-4ADA-9372-50BFA0BE5A14", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:560:3.1.4u2:*:*:*:*:*:*:*", "matchCriteriaId": "8BF22988-69AF-48EE-9CF7-56DE94E1A32B", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:580:1.7.8_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "1518061C-7B28-4ECC-B891-DD7474F0F908", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:580:1.7.9_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "C44C97ED-41CA-43ED-AE5F-28BE852468C1", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:580:1.7.10_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "FF1D4E8B-15CB-4431-B00C-71FF6B409F36", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:580:1.8.4_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "9B9DF9CF-CC4D-463F-8906-C30C5D63CE0E", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:580:1.8.5_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "881D6995-B00E-4F7A-B242-7774F3358BAD", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:580:1.8_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "C964D968-EB4B-4A26-9806-9F87D7D7432D", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:580:3.1.4u2_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "72E71919-E23B-4B0F-872D-49626D13E762", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:585:1.7.8_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "C7C0739F-513C-4553-887F-9935FB09D0B3", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:585:1.7.9_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "40D50ED5-7FB8-4878-A519-CB610AB87D81", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:585:1.7.10_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "D8A68998-9F26-42EE-AD7F-7660409CFE99", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:585:1.8.4_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "122D11B3-3044-4BCC-97F8-753720AC6615", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:585:1.8.5_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "7E66842F-3EC5-4089-8782-2B063D4457A4", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:585:1.8_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "0B58ABEC-7257-456F-952B-C913D5C59FCE", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:585:3.1.4u2_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "7D4B9B73-C47D-4183-88F4-717028E64840", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:640:1.7.8_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "D79801B0-952C-448C-A25D-AAE002DA4200", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:640:1.7.9_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "E1F43EEB-7F6E-4D4C-BFA5-5BEDA1A54557", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:640:1.7.10_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "7D78AC34-6C21-4162-9777-A7563FD56075", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:640:1.8.4_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "3BEC2E82-E2A6-4D38-8315-5BBFFBF507FE", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:640:1.8.5_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "0C92B730-3FDF-4BBE-BF87-6962E58B3611", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:640:1.8_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "8124ED35-32B6-4D66-B658-2585B18970D5", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:640:3.1.4u2_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "69A20968-FCE5-462B-911E-2074D0ECD56F", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:710:1.7.8_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "28B080D5-858C-464E-932A-53A6730AC5F8", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:710:1.7.9_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "78C587BD-DC7E-4EC8-800C-CE21029C3BF2", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:710:1.7.10_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "327B9621-D6C1-49AB-BF85-57EB9F3E6035", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:710:1.8.4_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "EBD5C0BE-34CB-43D2-AF9E-8F1480A02281", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:710:1.8.5_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "AB2D37B0-FBE1-4A98-8562-01DE1F828D1D", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:710:1.8_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "A0D8045C-E9FA-42B2-8824-F27133608AC4", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:710:3.1.4u2_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "33971918-8B65-46AB-84DD-695081B724D2", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:720:1.7.8_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "EB898390-05D1-485D-B258-7B0F246F0A21", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:720:1.7.9_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "BAA03627-9DA9-40E0-BEBA-F2CB00C04EC8", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:720:1.7.10_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "F90B69E9-72BD-4C0F-A045-A2BC11B651FA", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:720:1.8.4_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "26BF65DA-20F6-4956-B54A-004FFBAA2756", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:720:1.8.5_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "A9DB2DC3-20D9-4677-AC3D-0C05A16F7FAE", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:720:1.8_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "64ADDE44-D64D-4C85-85ED-28CD9828DDA4", "vulnerable": true}, {"criteria": "cpe:2.3:h:snapgear:720:3.1.4u2_firmware:*:*:*:*:*:*:*", "matchCriteriaId": "F6431FA9-06C5-48F4-B236-FD72A4C3F03F", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613."}, {"lang": "es", "value": "Los dispositivos (appliance) SnapGear 560, 585, 580, 640, 710, y 720 versiones anteriores al firmware 3.1.4u5, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (p\u00e9rdida completa de paquete) mediante una inundaci\u00f3n de paquetes, vulnerabilidad distinta a CVE-2006-4613."}], "id": "CVE-2007-1324", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2007-03-07T21:19:00.000", "references": [{"source": "cve@mitre.org", "url": "http://osvdb.org/33864"}, {"source": "cve@mitre.org", "url": "http://secunia.com/advisories/24388"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory", "URL Repurposed"], "url": "http://www.cyberguard.info/snapgear/releases.html"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/22835"}, {"source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0850"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/33864"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24388"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory", "URL Repurposed"], "url": "http://www.cyberguard.info/snapgear/releases.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/22835"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0850"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}