CVE-2007-1593 (GCVE-0-2007-1593)
Vulnerability from cvelistv5 – Published: 2007-06-04 16:00 – Updated: 2024-08-07 12:59
VLAI?
Summary
The administrative service in Symantec Veritas Volume Replicator (VVR) for Windows 3.1 through 4.3, and VVR for Unix 3.5 through 5.0, in Symantec Storage Foundation products allows remote attackers to cause a denial of service (memory consumption and service crash) via a crafted packet to the service port (8199/tcp) that triggers a request for more memory than available, which causes the service to write to an invalid pointer.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:59:08.964Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://cirt.dk/advisories/cirt-53-advisory.txt"
},
{
"name": "symantec-vvr-dos(34676)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34676"
},
{
"name": "36102",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/36102"
},
{
"name": "25516",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25516"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.symantec.com/avcenter/security/Content/2007.06.01a.html"
},
{
"name": "1018184",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018184"
},
{
"name": "ADV-2007-2036",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2036"
},
{
"name": "24160",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/24160"
},
{
"name": "20070601 Symantec VERITAS Storage Foundation Administration Service DoS Vulnerability",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE",
"x_transferred"
],
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=539"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-06-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The administrative service in Symantec Veritas Volume Replicator (VVR) for Windows 3.1 through 4.3, and VVR for Unix 3.5 through 5.0, in Symantec Storage Foundation products allows remote attackers to cause a denial of service (memory consumption and service crash) via a crafted packet to the service port (8199/tcp) that triggers a request for more memory than available, which causes the service to write to an invalid pointer."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://cirt.dk/advisories/cirt-53-advisory.txt"
},
{
"name": "symantec-vvr-dos(34676)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34676"
},
{
"name": "36102",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/36102"
},
{
"name": "25516",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25516"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.symantec.com/avcenter/security/Content/2007.06.01a.html"
},
{
"name": "1018184",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018184"
},
{
"name": "ADV-2007-2036",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2036"
},
{
"name": "24160",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/24160"
},
{
"name": "20070601 Symantec VERITAS Storage Foundation Administration Service DoS Vulnerability",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE"
],
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=539"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1593",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The administrative service in Symantec Veritas Volume Replicator (VVR) for Windows 3.1 through 4.3, and VVR for Unix 3.5 through 5.0, in Symantec Storage Foundation products allows remote attackers to cause a denial of service (memory consumption and service crash) via a crafted packet to the service port (8199/tcp) that triggers a request for more memory than available, which causes the service to write to an invalid pointer."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://cirt.dk/advisories/cirt-53-advisory.txt",
"refsource": "MISC",
"url": "http://cirt.dk/advisories/cirt-53-advisory.txt"
},
{
"name": "symantec-vvr-dos(34676)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34676"
},
{
"name": "36102",
"refsource": "OSVDB",
"url": "http://osvdb.org/36102"
},
{
"name": "25516",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25516"
},
{
"name": "http://www.symantec.com/avcenter/security/Content/2007.06.01a.html",
"refsource": "CONFIRM",
"url": "http://www.symantec.com/avcenter/security/Content/2007.06.01a.html"
},
{
"name": "1018184",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018184"
},
{
"name": "ADV-2007-2036",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2036"
},
{
"name": "24160",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24160"
},
{
"name": "20070601 Symantec VERITAS Storage Foundation Administration Service DoS Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=539"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1593",
"datePublished": "2007-06-04T16:00:00",
"dateReserved": "2007-03-22T00:00:00",
"dateUpdated": "2024-08-07T12:59:08.964Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:symantec:veritas_volume_replicator:3.1:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"F00219E2-7D07-453C-8495-F2BC2BA2996E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:symantec:veritas_volume_replicator:3.5:*:unix:*:*:*:*:*\", \"matchCriteriaId\": \"1B35A994-21E6-4054-B7C0-BEE09C48E10E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:symantec:veritas_volume_replicator:4.0:*:unix:*:*:*:*:*\", \"matchCriteriaId\": \"343C262F-5E28-4D3A-9F4F-FF71218E24BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:symantec:veritas_volume_replicator:4.1:*:unix:*:*:*:*:*\", \"matchCriteriaId\": \"C48AE2B2-E03A-48E1-B48B-5E8FEE5F637C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:symantec:veritas_volume_replicator:4.1:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"1ECDB104-6836-4EE2-830E-06BE222B2666\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:symantec:veritas_volume_replicator:4.1:rp1:windows:*:*:*:*:*\", \"matchCriteriaId\": \"1BC9AFF0-B574-419F-ADD4-E42102A4B1AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:symantec:veritas_volume_replicator:4.2:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"923C308F-4B57-4966-A1B7-CAFBEB77065D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:symantec:veritas_volume_replicator:4.2:rp1:windows:*:*:*:*:*\", \"matchCriteriaId\": \"9D4CDBDA-22F5-430E-95DC-CBA173AAD78E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:symantec:veritas_volume_replicator:4.2:rp2:windows:*:*:*:*:*\", \"matchCriteriaId\": \"28CF2817-461F-4C66-A4B8-8C8D5F2296C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:symantec:veritas_volume_replicator:4.3:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"91245A00-98AC-45F5-832F-F61B9DC967C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:symantec:veritas_volume_replicator:4.3:mp3:windows:*:*:*:*:*\", \"matchCriteriaId\": \"41B1E100-4557-4B8A-90C6-940FDFD2A187\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:symantec:veritas_volume_replicator:5.0:*:unix:*:*:*:*:*\", \"matchCriteriaId\": \"E399AC1E-A782-4BAE-B53D-5E088F8E1086\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The administrative service in Symantec Veritas Volume Replicator (VVR) for Windows 3.1 through 4.3, and VVR for Unix 3.5 through 5.0, in Symantec Storage Foundation products allows remote attackers to cause a denial of service (memory consumption and service crash) via a crafted packet to the service port (8199/tcp) that triggers a request for more memory than available, which causes the service to write to an invalid pointer.\"}, {\"lang\": \"es\", \"value\": \"El servicio administrativo de Symantec Veritas Volume Replicator (VVR) para Windows versiones 3.1 hasta 4.3, y VVR para Unix versiones 3.5 hasta 5.0, en productos de Symantec Storage Foundation, permite a atacantes remotos causar una denegaci\\u00f3n de servicio (consumo de memoria y bloqueo del servicio) por medio de un paquete dise\\u00f1ado hacia el puerto de servicio (8199/tcp) que desencadena una petici\\u00f3n de m\\u00e1s memoria de la disponible, lo que causa que el servicio escriba en un puntero no v\\u00e1lido.\"}]",
"id": "CVE-2007-1593",
"lastModified": "2024-11-21T00:28:42.357",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2007-06-04T16:30:00.000",
"references": "[{\"url\": \"http://cirt.dk/advisories/cirt-53-advisory.txt\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=539\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://osvdb.org/36102\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/25516\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/24160\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1018184\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.symantec.com/avcenter/security/Content/2007.06.01a.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/2036\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/34676\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://cirt.dk/advisories/cirt-53-advisory.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=539\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://osvdb.org/36102\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/25516\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/24160\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1018184\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.symantec.com/avcenter/security/Content/2007.06.01a.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/2036\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/34676\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2007-1593\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-06-04T16:30:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The administrative service in Symantec Veritas Volume Replicator (VVR) for Windows 3.1 through 4.3, and VVR for Unix 3.5 through 5.0, in Symantec Storage Foundation products allows remote attackers to cause a denial of service (memory consumption and service crash) via a crafted packet to the service port (8199/tcp) that triggers a request for more memory than available, which causes the service to write to an invalid pointer.\"},{\"lang\":\"es\",\"value\":\"El servicio administrativo de Symantec Veritas Volume Replicator (VVR) para Windows versiones 3.1 hasta 4.3, y VVR para Unix versiones 3.5 hasta 5.0, en productos de Symantec Storage Foundation, permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria y bloqueo del servicio) por medio de un paquete dise\u00f1ado hacia el puerto de servicio (8199/tcp) que desencadena una petici\u00f3n de m\u00e1s memoria de la disponible, lo que causa que el servicio escriba en un puntero no v\u00e1lido.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_volume_replicator:3.1:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F00219E2-7D07-453C-8495-F2BC2BA2996E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_volume_replicator:3.5:*:unix:*:*:*:*:*\",\"matchCriteriaId\":\"1B35A994-21E6-4054-B7C0-BEE09C48E10E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_volume_replicator:4.0:*:unix:*:*:*:*:*\",\"matchCriteriaId\":\"343C262F-5E28-4D3A-9F4F-FF71218E24BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_volume_replicator:4.1:*:unix:*:*:*:*:*\",\"matchCriteriaId\":\"C48AE2B2-E03A-48E1-B48B-5E8FEE5F637C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_volume_replicator:4.1:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"1ECDB104-6836-4EE2-830E-06BE222B2666\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_volume_replicator:4.1:rp1:windows:*:*:*:*:*\",\"matchCriteriaId\":\"1BC9AFF0-B574-419F-ADD4-E42102A4B1AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_volume_replicator:4.2:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"923C308F-4B57-4966-A1B7-CAFBEB77065D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_volume_replicator:4.2:rp1:windows:*:*:*:*:*\",\"matchCriteriaId\":\"9D4CDBDA-22F5-430E-95DC-CBA173AAD78E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_volume_replicator:4.2:rp2:windows:*:*:*:*:*\",\"matchCriteriaId\":\"28CF2817-461F-4C66-A4B8-8C8D5F2296C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_volume_replicator:4.3:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"91245A00-98AC-45F5-832F-F61B9DC967C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_volume_replicator:4.3:mp3:windows:*:*:*:*:*\",\"matchCriteriaId\":\"41B1E100-4557-4B8A-90C6-940FDFD2A187\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_volume_replicator:5.0:*:unix:*:*:*:*:*\",\"matchCriteriaId\":\"E399AC1E-A782-4BAE-B53D-5E088F8E1086\"}]}]}],\"references\":[{\"url\":\"http://cirt.dk/advisories/cirt-53-advisory.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=539\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/36102\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25516\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/24160\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1018184\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.symantec.com/avcenter/security/Content/2007.06.01a.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2036\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/34676\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://cirt.dk/advisories/cirt-53-advisory.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=539\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/36102\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25516\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/24160\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1018184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.symantec.com/avcenter/security/Content/2007.06.01a.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2036\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/34676\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…