VAR-200701-0211

Vulnerability from variot - Updated: 2023-12-18 13:15

AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060). FRITZ!Box is prone to a remote denial-of-service vulnerability. A remote attacker can exploit this issue to crash the VoIP-telephony service, effectively denying service to legitimate users.


Secunia is proud to announce the availability of the Secunia Software Inspector.

The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor.

Try it out online: http://secunia.com/software_inspector/


TITLE: Fritz!Box UDP Packet SIP Denial of Service

SECUNIA ADVISORY ID: SA23868

VERIFY ADVISORY: http://secunia.com/advisories/23868/

CRITICAL: Moderately critical

IMPACT: DoS

WHERE:

From remote

OPERATING SYSTEM: AVM Fritz!Box 7050 http://secunia.com/product/13298/

DESCRIPTION: Matthias Wenzel has reported a vulnerability in AVM Fritz!Box 7050, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the handling of certain UDP packets.

SOLUTION: Use another device.

PROVIDED AND/OR DISCOVERED BY: Matthias Wenzel

ORIGINAL ADVISORY: http://mazzoo.de/blog/2007/01/18#FritzBox_DoS


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200701-0211",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "fritzbox",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "avm",
        "version": "7050"
      },
      {
        "model": "fritz!box",
        "scope": null,
        "trust": 0.8,
        "vendor": "avm",
        "version": null
      },
      {
        "model": "fritz!box",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avm",
        "version": "7050"
      },
      {
        "model": "fritz!box",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "avm",
        "version": "705014.4.2"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:avm:fritzbox:7050:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Matthias Wenzel",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2007-0431",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.8,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2007-0431",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2007-0431",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200701-379",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060). FRITZ!Box is prone to a remote denial-of-service vulnerability. \nA remote attacker can exploit this issue to crash the VoIP-telephony service, effectively denying service to legitimate users. \n\n----------------------------------------------------------------------\n\nSecunia is proud to announce the availability of the Secunia Software\nInspector. \n\nThe Secunia Software Inspector is a free service that detects insecure\nversions of software that you may have installed in your system. When\ninsecure versions are detected, the Secunia Software Inspector also\nprovides thorough guidelines for updating the software to the latest\nsecure version from the vendor. \n\nTry it out online:\nhttp://secunia.com/software_inspector/\n\n----------------------------------------------------------------------\n\nTITLE:\nFritz!Box UDP Packet SIP Denial of Service\n\nSECUNIA ADVISORY ID:\nSA23868\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/23868/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nAVM Fritz!Box 7050\nhttp://secunia.com/product/13298/\n\nDESCRIPTION:\nMatthias Wenzel has reported a vulnerability in AVM Fritz!Box 7050,\nwhich can be exploited by malicious people to cause a DoS (Denial of\nService). \n\nThe vulnerability is caused due to an error within the handling of\ncertain UDP packets. \n\nSOLUTION:\nUse another device. \n\nPROVIDED AND/OR DISCOVERED BY:\nMatthias Wenzel\n\nORIGINAL ADVISORY:\nhttp://mazzoo.de/blog/2007/01/18#FritzBox_DoS\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "PACKETSTORM",
        "id": "53817"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-0431",
        "trust": 2.4
      },
      {
        "db": "BID",
        "id": "22130",
        "trust": 1.9
      },
      {
        "db": "SECUNIA",
        "id": "23868",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "32940",
        "trust": 1.6
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-0272",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "31633",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20070119 DOS AGAINST AVM FRITZ!BOX 7050 (AND OTHERS)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20070119 DOS AGAINST AVM FRITZ!BOX 7050 (AND OTHERS)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20070123 RE: DOS AGAINST AVM FRITZ!BOX 7050 (AND OTHERS)",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "53817",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "PACKETSTORM",
        "id": "53817"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ]
  },
  "id": "VAR-200701-0211",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.4861111
  },
  "last_update_date": "2023-12-18T13:15:49.795000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.avm.de/en/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "http://mazzoo.de/blog/2007/01/18#fritzbox_dos"
      },
      {
        "trust": 1.6,
        "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
      },
      {
        "trust": 1.6,
        "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
      },
      {
        "trust": 1.6,
        "url": "http://osvdb.org/32940"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/23868"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/22130"
      },
      {
        "trust": 1.0,
        "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
      },
      {
        "trust": 1.0,
        "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2007/0272"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0431"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0431"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/457406/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/31633"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/457829/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2007/0272"
      },
      {
        "trust": 0.3,
        "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/"
      },
      {
        "trust": 0.3,
        "url": "http://www.avm.de/en/"
      },
      {
        "trust": 0.3,
        "url": "http://www.avm.de/de/produkte/fritzbox/index.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/457406"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/457829"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/23868/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/software_inspector/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13298/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "PACKETSTORM",
        "id": "53817"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "PACKETSTORM",
        "id": "53817"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-01-19T00:00:00",
        "db": "BID",
        "id": "22130"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "date": "2007-01-22T15:23:39",
        "db": "PACKETSTORM",
        "id": "53817"
      },
      {
        "date": "2007-01-23T02:28:00",
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "date": "2007-01-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-01-25T16:28:00",
        "db": "BID",
        "id": "22130"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "date": "2018-10-16T16:32:32.793000",
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "date": "2007-01-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "AVM FRITZ!Box VoIP Remote Denial of Service Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…