VAR-200703-0308

Vulnerability from variot - Updated: 2023-12-18 12:23

Unspecified vulnerability in ManageEngine Firewall Analyzer allows remote authenticated users to "access any common file" via a direct URL request. ManageEngine Firewall Analyzer is prone to a remote information-disclosure vulnerability. A remote authenticated attacker can leverage this issue to access sensitive data. Information obtained could aid in further attacks.


Want a new job? http://secunia.com/secunia_vacancies/

Secunia is looking for new researchers with a reversing background and experience in writing exploit code: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ http://secunia.com/Disassembling_og_Reversing/ http://secunia.com/Linux_Security_Specialist/


TITLE: ManageEngine Firewall Analyzer Information Disclosure

SECUNIA ADVISORY ID: SA24707

VERIFY ADVISORY: http://secunia.com/advisories/24707/

CRITICAL: Less critical

IMPACT: Exposure of sensitive information

WHERE:

From remote

SOFTWARE: ManageEngine Firewall Analyzer 4.x http://secunia.com/product/13811/

DESCRIPTION: yearsilent has reported a security issue in ManageEngine Firewall Analyzer, which can be exploited by malicious users to disclose potentially sensitive information.

SOLUTION: Reportedly, the vulnerability will be fixed in build 4030. Please contact the vendor for early access to this build version.

PROVIDED AND/OR DISCOVERED BY: yearsilent


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200703-0308",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "firewall analyzer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "manageengine",
        "version": "4.0"
      },
      {
        "model": "manageengine firewall analyzer",
        "scope": null,
        "trust": 0.8,
        "vendor": "zoho",
        "version": null
      },
      {
        "model": "firewall analyzer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "manageengine",
        "version": "4"
      },
      {
        "model": "firewall analyzer build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "manageengine",
        "version": "44030"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "23097"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003571"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1642"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-576"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:manageengine:firewall_analyzer:4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1642"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "yearsilent is credited with the discovery of this vulnerability.",
    "sources": [
      {
        "db": "BID",
        "id": "23097"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-576"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2007-1642",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2007-1642",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "VHN-25004",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2007-1642",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200703-576",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-25004",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-25004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003571"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1642"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-576"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unspecified vulnerability in ManageEngine Firewall Analyzer allows remote authenticated users to \"access any common file\" via a direct URL request. ManageEngine Firewall Analyzer is prone to a remote information-disclosure vulnerability. \nA remote authenticated attacker can leverage this issue to access sensitive data. Information obtained could aid in further attacks. \n\n----------------------------------------------------------------------\n\nWant a new job?\nhttp://secunia.com/secunia_vacancies/\n\nSecunia is looking for new researchers with a reversing background\nand experience in writing exploit code:\nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\nhttp://secunia.com/Disassembling_og_Reversing/\nhttp://secunia.com/Linux_Security_Specialist/\n\n----------------------------------------------------------------------\n\nTITLE:\nManageEngine Firewall Analyzer Information Disclosure\n\nSECUNIA ADVISORY ID:\nSA24707\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/24707/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nExposure of sensitive information\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nManageEngine Firewall Analyzer 4.x\nhttp://secunia.com/product/13811/\n\nDESCRIPTION:\nyearsilent has reported a security issue in ManageEngine Firewall\nAnalyzer, which can be exploited by malicious users to disclose\npotentially sensitive information. \n\nSOLUTION:\nReportedly, the vulnerability will be fixed in build 4030. Please\ncontact the vendor for early access to this build version. \n\nPROVIDED AND/OR DISCOVERED BY:\nyearsilent\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1642"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003571"
      },
      {
        "db": "BID",
        "id": "23097"
      },
      {
        "db": "VULHUB",
        "id": "VHN-25004"
      },
      {
        "db": "PACKETSTORM",
        "id": "55479"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-1642",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "23097",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "24707",
        "trust": 1.8
      },
      {
        "db": "OSVDB",
        "id": "34525",
        "trust": 1.7
      },
      {
        "db": "SREASON",
        "id": "2479",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003571",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-576",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "33319",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20070329 RE: MANAGEENGINE FIREWALL ANALYZER ARBITRARY FILE DISCLOSURE TO AUTHORIZED USER",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20070322 MANAGEENGINE FIREWALL ANALYZER ARBITRARY FILE DISCLOSURE TO AUTHORIZED USER",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20070330 RE: MANAGEENGINE FIREWALL ANALYZER ARBITRARY FILE DISCLOSURE TO AUTHORIZED USER",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-25004",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "55479",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-25004"
      },
      {
        "db": "BID",
        "id": "23097"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003571"
      },
      {
        "db": "PACKETSTORM",
        "id": "55479"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1642"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-576"
      }
    ]
  },
  "id": "VAR-200703-0308",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-25004"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:23:39.904000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Firewall Analyzer",
        "trust": 0.8,
        "url": "http://www.manageengine.com/products/firewall/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003571"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1642"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/23097"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/34525"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/24707"
      },
      {
        "trust": 1.7,
        "url": "http://securityreason.com/securityalert/2479"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/463509/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/464154/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/464271/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33319"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1642"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1642"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/33319"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/464271/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/464154/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/463509/100/0/threaded"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/463509"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/464154"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/464271"
      },
      {
        "trust": 0.3,
        "url": "http://manageengine.adventnet.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13811/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/disassembling_og_reversing/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/24707/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_vacancies/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/linux_security_specialist/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-25004"
      },
      {
        "db": "BID",
        "id": "23097"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003571"
      },
      {
        "db": "PACKETSTORM",
        "id": "55479"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1642"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-576"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-25004"
      },
      {
        "db": "BID",
        "id": "23097"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003571"
      },
      {
        "db": "PACKETSTORM",
        "id": "55479"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1642"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-576"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-03-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-25004"
      },
      {
        "date": "2007-03-22T00:00:00",
        "db": "BID",
        "id": "23097"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-003571"
      },
      {
        "date": "2007-04-02T02:42:23",
        "db": "PACKETSTORM",
        "id": "55479"
      },
      {
        "date": "2007-03-24T00:19:00",
        "db": "NVD",
        "id": "CVE-2007-1642"
      },
      {
        "date": "2007-03-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200703-576"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-25004"
      },
      {
        "date": "2007-03-30T16:53:00",
        "db": "BID",
        "id": "23097"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-003571"
      },
      {
        "date": "2018-10-16T16:39:36.830000",
        "db": "NVD",
        "id": "CVE-2007-1642"
      },
      {
        "date": "2007-04-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200703-576"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-576"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ManageEngine Firewall Analyzer Vulnerabilities in accessing arbitrary common files",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003571"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "23097"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-576"
      }
    ],
    "trust": 0.9
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…