var-200112-0223
Vulnerability from variot
Alcatel ADSL modems allow remote attackers to access the Trivial File Transfer Protocol (TFTP) to modify firmware and configuration via a bounce attack from a system on the local area network (LAN) side, which is allowed to access TFTP without authentication. The San Diego Supercomputer Center (SDSC) has recently discovered several vulnerabilities in the Alcatel Speed Touch line of Asymmetric Digital Subscriber Line (ADSL) modems. These vulnerabilities are the result of weak authentication and access control policies and result in one or more of the following impacts: unauthorized access, unauthorized monitoring, information leakage, denial of service, and permanent disability of affected devices.The SDSC has published additional information regarding these vulnerabilities at http://security.sdsc.edu/self-help/alcatel/. The Lotus Domino Web Server contains a flaw that could be exploited to cause a denial of service. Due to a problem parsing carriage return/line feeds in RFC822 format mail messages, The Bat! mail client may permaturely detect the end of a mail message, causing an error to occur. This error may prevent the mail user from retrieving other mail messages until the message with the error is removed. Adsl Modem 1000 is prone to a remote security vulnerability. "The Bat!" is an MUA for Windows by Rit Research Labs. "The Bat!" is vulnerable to a remote denial of service attack. Email messages in which carriage return (CR) characters are not followed by a linefeed (LF) can cause "The Bat!" to incorrectly interpret the message's structure. This can lead "The Bat!" to read text in the message body as a response from the POP3 server. The current (corrupt) message will not be deleted from the server, and the mail download process will stop. As a result, the user will remain unable to receive new email messages from the affected POP3 account. Alcatel ADSL modems are vulnerable. The vulnerability allows unauthenticated access to TFTP
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200112-0223", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 2.4, "vendor": "lotus", "version": null }, { "model": "speed touch adsl modem", "scope": "eq", "trust": 1.6, "vendor": "alcatel", "version": "home" }, { "model": "adsl modem 1000", "scope": "eq", "trust": 1.0, "vendor": "alcatel", "version": "*" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "alcatel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rit", "version": null }, { "model": "adsl modem 1000", "scope": null, "trust": 0.6, "vendor": "alcatel", "version": null }, { "model": "speed touch adsl modem home", "scope": null, "trust": 0.3, "vendor": "alcatel", "version": null }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.101" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.51" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.49" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.48" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.47" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.46" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.45" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.44" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.43" }, { "model": "research labs the bat! f", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.42" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.42" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.41" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.39" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.36" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.35" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.34" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.33" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.32" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.31" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.22" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.21" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.19" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.18" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.17" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.15" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.14" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.5" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.1" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.043" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.041" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.039" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.036" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.035" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.032" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.031" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.029" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.028" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.015" }, { "model": "research labs the bat!", "scope": "eq", "trust": 0.3, "vendor": "rit", "version": "1.011" }, { "model": "research labs the bat!", "scope": "ne", "trust": 0.3, "vendor": "rit", "version": "1.52" } ], "sources": [ { "db": "CERT/CC", "id": "VU#211736" }, { "db": "CERT/CC", "id": "VU#676552" }, { "db": "CERT/CC", "id": "VU#601312" }, { "db": "CERT/CC", "id": "VU#555464" }, { "db": "CERT/CC", "id": "VU#310816" }, { "db": "BID", "id": "89747" }, { "db": "BID", "id": "2636" }, { "db": "CNNVD", "id": "CNNVD-200112-195" }, { "db": "NVD", "id": "CVE-2001-1484" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:alcatel:speed_touch_adsl_modem:home:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:alcatel:adsl_modem_1000:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2001-1484" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "89747" } ], "trust": 0.3 }, "cve": "CVE-2001-1484", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-4288", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2001-1484", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#211736", "trust": 0.8, "value": "27.56" }, { "author": "CARNEGIE MELLON", "id": "VU#676552", "trust": 0.8, "value": "10.50" }, { "author": "CARNEGIE MELLON", "id": "VU#601312", "trust": 0.8, "value": "9.98" }, { "author": "CARNEGIE MELLON", "id": "VU#555464", "trust": 0.8, "value": "4.25" }, { "author": "CARNEGIE MELLON", "id": "VU#310816", "trust": 0.8, "value": "1.62" }, { "author": "CNNVD", "id": "CNNVD-200112-195", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-4288", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#211736" }, { "db": "CERT/CC", "id": "VU#676552" }, { "db": "CERT/CC", "id": "VU#601312" }, { "db": "CERT/CC", "id": "VU#555464" }, { "db": "CERT/CC", "id": "VU#310816" }, { "db": "VULHUB", "id": "VHN-4288" }, { "db": "CNNVD", "id": "CNNVD-200112-195" }, { "db": "NVD", "id": "CVE-2001-1484" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Alcatel ADSL modems allow remote attackers to access the Trivial File Transfer Protocol (TFTP) to modify firmware and configuration via a bounce attack from a system on the local area network (LAN) side, which is allowed to access TFTP without authentication. The San Diego Supercomputer Center (SDSC) has recently discovered several vulnerabilities in the Alcatel Speed Touch line of Asymmetric Digital Subscriber Line (ADSL) modems. These vulnerabilities are the result of weak authentication and access control policies and result in one or more of the following impacts: unauthorized access, unauthorized monitoring, information leakage, denial of service, and permanent disability of affected devices.The SDSC has published additional information regarding these vulnerabilities at http://security.sdsc.edu/self-help/alcatel/. The Lotus Domino Web Server contains a flaw that could be exploited to cause a denial of service. Due to a problem parsing carriage return/line feeds in RFC822 format mail messages, The Bat! mail client may permaturely detect the end of a mail message, causing an error to occur. This error may prevent the mail user from retrieving other mail messages until the message with the error is removed. Adsl Modem 1000 is prone to a remote security vulnerability. \"The Bat!\" is an MUA for Windows by Rit Research Labs. \n\"The Bat!\" is vulnerable to a remote denial of service attack. Email messages in which carriage return (CR) characters are not followed by a linefeed (LF) can cause \"The Bat!\" to incorrectly interpret the message\u0027s structure. This can lead \"The Bat!\" to read text in the message body as a response from the POP3 server. The current (corrupt) message will not be deleted from the server, and the mail download process will stop. \nAs a result, the user will remain unable to receive new email messages from the affected POP3 account. Alcatel ADSL modems are vulnerable. The vulnerability allows unauthenticated access to TFTP", "sources": [ { "db": "NVD", "id": "CVE-2001-1484" }, { "db": "CERT/CC", "id": "VU#211736" }, { "db": "CERT/CC", "id": "VU#676552" }, { "db": "CERT/CC", "id": "VU#601312" }, { "db": "CERT/CC", "id": "VU#555464" }, { "db": "CERT/CC", "id": "VU#310816" }, { "db": "BID", "id": "89747" }, { "db": "BID", "id": "2636" }, { "db": "VULHUB", "id": "VHN-4288" } ], "trust": 5.13 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#211736", "trust": 2.8 }, { "db": "NVD", "id": "CVE-2001-1484", "trust": 2.0 }, { "db": "BID", "id": "2636", "trust": 1.1 }, { "db": "XF", "id": "6336", "trust": 0.9 }, { "db": "BID", "id": "2571", "trust": 0.8 }, { "db": "XF", "id": "6349", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#676552", "trust": 0.8 }, { "db": "XF", "id": "6347", "trust": 0.8 }, { "db": "BID", "id": "2565", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#601312", "trust": 0.8 }, { "db": "BID", "id": "2599", "trust": 0.8 }, { "db": "XF", "id": "6350", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#555464", "trust": 0.8 }, { "db": "XF", "id": "6423", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#310816", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200112-195", "trust": 0.7 }, { "db": "CERT/CC", "id": "CA-2001-08", "trust": 0.6 }, { "db": "BID", "id": "89747", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-4288", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#211736" }, { "db": "CERT/CC", "id": "VU#676552" }, { "db": "CERT/CC", "id": "VU#601312" }, { "db": "CERT/CC", "id": "VU#555464" }, { "db": "CERT/CC", "id": "VU#310816" }, { "db": "VULHUB", "id": "VHN-4288" }, { "db": "BID", "id": "89747" }, { "db": "BID", "id": "2636" }, { "db": "CNNVD", "id": "CNNVD-200112-195" }, { "db": "NVD", "id": "CVE-2001-1484" } ] }, "id": "VAR-200112-0223", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-4288" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T20:28:55.223000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2001-1484" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.securityfocus.com/advisories/3208" }, { "trust": 2.0, "url": "http://www.cert.org/advisories/ca-2001-08.html" }, { "trust": 2.0, "url": "http://www.kb.cert.org/vuls/id/211736" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6336" }, { "trust": 0.9, "url": "http://xforce.iss.net/xforce/xfdb/6336" }, { "trust": 0.8, "url": "http://security.sdsc.edu/self-help/alcatel/" }, { "trust": 0.8, "url": "http://www.alcatel.com/consumer/dsl/security.htm" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/2571" }, { "trust": 0.8, "url": "http://xforce.iss.net/static/6349.php" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/2565" }, { "trust": 0.8, "url": "http://xforce.iss.net/static/6347.php" }, { "trust": 0.8, "url": "http://www.notes.net/r5fixlist.nsf/a8f0ffda1fc76c8985256752006aba6c?openview\u0026start=3.111\u0026count=30\u0026expand=3.126#3.126" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/2599" }, { "trust": 0.8, "url": "http://xforce.iss.net/static/6350.php" }, { "trust": 0.8, "url": "http://www.notes.net/r5fixlist.nsf/a8f0ffda1fc76c8985256752006aba6c/59719a1dd92c03e385256a4d0073766b?opendocument" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/2636" }, { "trust": 0.8, "url": "http://www.ritlabs.com/the_bat/index.html" }, { "trust": 0.8, "url": "http://www.security.nnov.ru/search/news.asp?binid=1136" }, { "trust": 0.8, "url": "http://xforce.iss.net/static/6423.php" }, { "trust": 0.3, "url": "http://www.thebat.net" } ], "sources": [ { "db": "CERT/CC", "id": "VU#211736" }, { "db": "CERT/CC", "id": "VU#676552" }, { "db": "CERT/CC", "id": "VU#601312" }, { "db": "CERT/CC", "id": "VU#555464" }, { "db": "CERT/CC", "id": "VU#310816" }, { "db": "VULHUB", "id": "VHN-4288" }, { "db": "BID", "id": "89747" }, { "db": "BID", "id": "2636" }, { "db": "CNNVD", "id": "CNNVD-200112-195" }, { "db": "NVD", "id": "CVE-2001-1484" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#211736" }, { "db": "CERT/CC", "id": "VU#676552" }, { "db": "CERT/CC", "id": "VU#601312" }, { "db": "CERT/CC", "id": "VU#555464" }, { "db": "CERT/CC", "id": "VU#310816" }, { "db": "VULHUB", "id": "VHN-4288" }, { "db": "BID", "id": "89747" }, { "db": "BID", "id": "2636" }, { "db": "CNNVD", "id": "CNNVD-200112-195" }, { "db": "NVD", "id": "CVE-2001-1484" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2001-04-10T00:00:00", "db": "CERT/CC", "id": "VU#211736" }, { "date": "2001-07-23T00:00:00", "db": "CERT/CC", "id": "VU#676552" }, { "date": "2001-07-12T00:00:00", "db": "CERT/CC", "id": "VU#601312" }, { "date": "2001-07-12T00:00:00", "db": "CERT/CC", "id": "VU#555464" }, { "date": "2001-06-01T00:00:00", "db": "CERT/CC", "id": "VU#310816" }, { "date": "2001-12-31T00:00:00", "db": "VULHUB", "id": "VHN-4288" }, { "date": "2001-12-31T00:00:00", "db": "BID", "id": "89747" }, { "date": "2001-04-18T00:00:00", "db": "BID", "id": "2636" }, { "date": "2001-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200112-195" }, { "date": "2001-12-31T05:00:00", "db": "NVD", "id": "CVE-2001-1484" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2001-04-11T00:00:00", "db": "CERT/CC", "id": "VU#211736" }, { "date": "2001-07-26T00:00:00", "db": "CERT/CC", "id": "VU#676552" }, { "date": "2001-07-17T00:00:00", "db": "CERT/CC", "id": "VU#601312" }, { "date": "2001-07-17T00:00:00", "db": "CERT/CC", "id": "VU#555464" }, { "date": "2001-08-30T00:00:00", "db": "CERT/CC", "id": "VU#310816" }, { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-4288" }, { "date": "2001-12-31T00:00:00", "db": "BID", "id": "89747" }, { "date": "2001-04-18T00:00:00", "db": "BID", "id": "2636" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200112-195" }, { "date": "2017-07-11T01:29:09.680000", "db": "NVD", "id": "CVE-2001-1484" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "89747" }, { "db": "BID", "id": "2636" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Alcatel ADSL modems grant unauthenticated TFTP access via Bounce Attacks", "sources": [ { "db": "CERT/CC", "id": "VU#211736" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Failure to Handle Exceptional Conditions", "sources": [ { "db": "BID", "id": "89747" }, { "db": "BID", "id": "2636" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.