VAR-200504-0069

Vulnerability from variot - Updated: 2023-12-18 12:47

The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations.". Various Kerio products are vulnerable to a denial of service vulnerability with regards to the administration port. This issue is due to a failure of the application to properly handle exceptional conditions with regards to specifically malformed data. A remote attacker may leverage these issues, without requiring authentication, to exhaust resources on an affected computer, effectively denying service for legitimate users. The vendor has addressed this issue in Kerio MailServer 6.0.9, Kerio WinRoute Firewall 6.0.11, and Kerio Personal Firewall 4.1.3; earlier versions of these products are reported vulnerable. Kerio WinRoute Firewall is an enterprise-level firewall of American Kerio Company, which provides functions such as Internet sharing, virus protection and transparent proxy

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200504-0069",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "personal firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "4.0.16"
      },
      {
        "model": "personal firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "4.0.10"
      },
      {
        "model": "personal firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "4.0.7"
      },
      {
        "model": "personal firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "4.0.6"
      },
      {
        "model": "mailserver",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0.5"
      },
      {
        "model": "mailserver",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0.4"
      },
      {
        "model": "mailserver",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0.3"
      },
      {
        "model": "mailserver",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0.2"
      },
      {
        "model": "mailserver",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0.1"
      },
      {
        "model": "mailserver",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.9"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.8"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.7"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.6"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.5"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.4"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.3"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.2"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.1"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0"
      },
      {
        "model": "personal firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "4.1.2"
      },
      {
        "model": "personal firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "4.1.1"
      },
      {
        "model": "personal firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "4.1"
      },
      {
        "model": "personal firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "4.0.9"
      },
      {
        "model": "personal firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "4.0.8"
      },
      {
        "model": "winroute firewall",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "kerio",
        "version": "6.0.11"
      },
      {
        "model": "personal firewall",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "kerio",
        "version": "4.1.3"
      },
      {
        "model": "mailserver",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "kerio",
        "version": "6.0.9"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "13458"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-1063"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200504-125"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:kerio:personal_firewall:4.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:personal_firewall:4.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:personal_firewall:4.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:kerio_mailserver:6.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:kerio_mailserver:6.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:kerio_mailserver:6.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:personal_firewall:4.0.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:personal_firewall:4.0.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:kerio_mailserver:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:kerio_mailserver:6.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:personal_firewall:4.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:personal_firewall:4.0.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:kerio_mailserver:6.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:personal_firewall:4.0.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:personal_firewall:4.0.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-1063"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Javier Munoz (Secure Computer Group) is credited with the discovery of this vulnerability.",
    "sources": [
      {
        "db": "BID",
        "id": "13458"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200504-125"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2005-1063",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-12272",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2005-1063",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200504-125",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-12272",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-12272"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-1063"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200504-125"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to \"compute unexpected conditions\" and \"perform cryptographic operations.\". Various Kerio products are vulnerable to a denial of service vulnerability with regards to the administration port. \nThis issue is due to a failure of the application to properly handle exceptional conditions with regards to specifically malformed data. \nA remote attacker may leverage these issues, without requiring\nauthentication, to exhaust resources on an affected computer, effectively\ndenying service for legitimate users. \nThe vendor has addressed this issue in Kerio MailServer 6.0.9, Kerio\nWinRoute Firewall 6.0.11, and Kerio Personal Firewall 4.1.3; earlier\nversions of these products are reported vulnerable. Kerio WinRoute Firewall is an enterprise-level firewall of American Kerio Company, which provides functions such as Internet sharing, virus protection and transparent proxy",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-1063"
      },
      {
        "db": "BID",
        "id": "13458"
      },
      {
        "db": "VULHUB",
        "id": "VHN-12272"
      }
    ],
    "trust": 1.26
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2005-1063",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200504-125",
        "trust": 0.7
      },
      {
        "db": "BUGTRAQ",
        "id": "20050429 [CAN-2005-1063] ADMINISTRATION PROTOCOL ABUSE LEADS TO SERVICE AND SYSTEM DENIAL OF SERVICE",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "13458",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-12272",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-12272"
      },
      {
        "db": "BID",
        "id": "13458"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-1063"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200504-125"
      }
    ]
  },
  "id": "VAR-200504-0069",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-12272"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:47:23.211000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-1063"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/archive/1/397220"
      },
      {
        "trust": 1.7,
        "url": "http://www.kerio.com/security_advisory.html"
      },
      {
        "trust": 1.4,
        "url": "http://research.tic.udc.es/scg/advisories/20050429-2.txt"
      },
      {
        "trust": 0.3,
        "url": "http://www.kerio.com"
      },
      {
        "trust": 0.3,
        "url": "http://www.sunbelt-software.com/kerio.cfm"
      },
      {
        "trust": 0.3,
        "url": "http://www.kerio.com/kwf_home.html"
      },
      {
        "trust": 0.1,
        "url": ""
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-12272"
      },
      {
        "db": "BID",
        "id": "13458"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-1063"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200504-125"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-12272"
      },
      {
        "db": "BID",
        "id": "13458"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-1063"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200504-125"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-04-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-12272"
      },
      {
        "date": "2005-05-02T00:00:00",
        "db": "BID",
        "id": "13458"
      },
      {
        "date": "2005-04-29T04:00:00",
        "db": "NVD",
        "id": "CVE-2005-1063"
      },
      {
        "date": "2005-04-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200504-125"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-09-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-12272"
      },
      {
        "date": "2009-07-12T14:06:00",
        "db": "BID",
        "id": "13458"
      },
      {
        "date": "2008-09-05T20:48:06.627000",
        "db": "NVD",
        "id": "CVE-2005-1063"
      },
      {
        "date": "2006-09-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200504-125"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200504-125"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kerio Management Port Denial of Service Vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200504-125"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200504-125"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…