[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-28902":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":43},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":40,"name":41,"published":42,"updated":27},28902,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},3,"OpenVAS",{"id":18,"codename":27,"description":27,"severity":27,"risk_description":28,"public_description":29,"public_recommendation":30,"recommendation":27,"references":31,"cvssv3":27,"epss_score":33,"epss_percentile":34,"cve":35,"in_cisa_catalog":38,"date":39,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"The following flaws exist: - CVE-2014-2111: NAT DNS vulnerability - CVE-2014-2109: TCP input vulnerability","The Cisco IOS Software implementation of the Network Address Translation (NAT) feature contains two vulnerabilities when translating IP packets that could allow an unauthenticated, remote attacker to cause a denial of service condition.","See the referenced vendor advisory for a solution.",[32],"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-nat",0.01117,0.78183,[36,37],"CVE-2014-2111","CVE-2014-2109",false,"2014-03-27T00:00:00Z","NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.105651","Cisco IOS Software Network Address Translation Vulnerabilities (cisco-sa-20140326-nat)","2026-02-25T00:00:00Z",["Island",44],{"key":45,"params":46,"result":48},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":47},"{\"text-color\":\"gray\"}",{"head":49},{}]