var-201607-0312
Vulnerability from variot
Cross-site request forgery (CSRF) vulnerability on NTT EAST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1006 and earlier and NTT WEST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1005 and earlier allows remote attackers to hijack the authentication of arbitrary users. Ryoya Tsukasaki of Urawa Commercial High School reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged in, unintended operations may be performed. NTTHikariDenwaPR-400MI, RV-440MI and RT-400MI are all router products of Japan Telecom Telephone (NTT). An attacker could exploit the vulnerability to perform unauthorized actions. This may aid in other attacks. The following products and versions are affected: NTT Hikari Denwa PR-400MI, RV-440MI, RT-400MI using firmware version 07.00.1006 and earlier, Hikari Denwa PR-400MI, RV-440MI, RT using firmware version 07.00.1005 and earlier -400MI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201607-0312", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pr-400mi", "scope": "eq", "trust": 1.6, "vendor": "ntt east", "version": "07.00.1006" }, { "model": "pr-400mi", "scope": "lte", "trust": 1.0, "vendor": "ntt west", "version": "07.00.1005" }, { "model": "rt-400mi", "scope": "lte", "trust": 1.0, "vendor": "ntt east", "version": "07.00.1006" }, { "model": "rt-400mi", "scope": "lte", "trust": 1.0, "vendor": "ntt west", "version": "07.00.1005" }, { "model": "rv-440mi", "scope": "lte", "trust": 1.0, "vendor": "ntt west", "version": "07.00.1005" }, { "model": "pr-400mi", "scope": "eq", "trust": 1.0, "vendor": "ntt west", "version": null }, { "model": "rv-440mi", "scope": "lte", "trust": 1.0, "vendor": "ntt east", "version": "07.00.1006" }, { "model": "pr-400mi", "scope": "lte", "trust": 0.8, "vendor": "nippon telegraph and telephone east", "version": "ver. 07.00.1006" }, { "model": "rt-400mi", "scope": "lte", "trust": 0.8, "vendor": "nippon telegraph and telephone east", "version": "ver. 07.00.1006" }, { "model": "rv-440mi", "scope": "lte", "trust": 0.8, "vendor": "nippon telegraph and telephone east", "version": "ver. 07.00.1006" }, { "model": "pr-400mi", "scope": "lte", "trust": 0.8, "vendor": "nippon telegraph and telephone west", "version": "ver. 07.00.1005" }, { "model": "rt-400mi", "scope": "lte", "trust": 0.8, "vendor": "nippon telegraph and telephone west", "version": "ver. 07.00.1005" }, { "model": "rv-440mi", "scope": "lte", "trust": 0.8, "vendor": "nippon telegraph and telephone west", "version": "ver. 07.00.1005" }, { "model": "hikari denwa rt-400mi", "scope": "lte", "trust": 0.6, "vendor": "nippon telegraph and telephone", "version": "\u003c=07.00.1006" }, { "model": "hikari denwa rt-400mi", "scope": "lte", "trust": 0.6, "vendor": "nippon telegraph and telephone", "version": "\u003c=07.00.1005" }, { "model": "hikari denwa rv-440m", "scope": "lte", "trust": 0.6, "vendor": "nippon telegraph and telephone", "version": "\u003c=07.00.1005" }, { "model": "hikari denwa rv-440m", "scope": "lte", "trust": 0.6, "vendor": "nippon telegraph and telephone", "version": "\u003c=07.00.1006" }, { "model": "hikari denwa pr-400mi", "scope": "lte", "trust": 0.6, "vendor": "nippon telegraph and telephone", "version": "\u003c=07.00.1005" }, { "model": "hikari denwa pr-400mi", "scope": "lte", "trust": 0.6, "vendor": "nippon telegraph and telephone", "version": "\u003c=07.00.1006" }, { "model": "rv-440mi", "scope": "eq", "trust": 0.6, "vendor": "ntt east", "version": "07.00.1006" }, { "model": "rt-400mi", "scope": "eq", "trust": 0.6, "vendor": "ntt east", "version": "07.00.1006" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04402" }, { "db": "JVNDB", "id": "JVNDB-2016-000106" }, { "db": "NVD", "id": "CVE-2016-1228" }, { "db": "CNNVD", "id": "CNNVD-201606-604" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:ntt-west:pr-400mi_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "07.00.1005", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:ntt-west:pr-400mi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:ntt-west:rt-400mi_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "07.00.1005", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:ntt-west:rt-400mi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:ntt-west:rv-440mi_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "07.00.1005", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:ntt-west:rv-440mi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:ntt-east:pr-400mi_firmware:07.00.1006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:ntt-east:pr-400mi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:ntt-east:rt-400mi_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "07.00.1006", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:ntt-east:rt-400mi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:ntt-east:rv-440mi_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "07.00.1006", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:ntt-east:rv-440mi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-1228" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ryoya Tsukasaki of Urawa Commercial High School", "sources": [ { "db": "CNNVD", "id": "CNNVD-201606-604" } ], "trust": 0.6 }, "cve": "CVE-2016-1228", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2016-000106", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "CNVD-2016-04402", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-90047", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "None", "baseScore": 7.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2016-000106", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-1228", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2016-000106", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-04402", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201606-604", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-90047", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04402" }, { "db": "VULHUB", "id": "VHN-90047" }, { "db": "JVNDB", "id": "JVNDB-2016-000106" }, { "db": "NVD", "id": "CVE-2016-1228" }, { "db": "CNNVD", "id": "CNNVD-201606-604" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site request forgery (CSRF) vulnerability on NTT EAST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1006 and earlier and NTT WEST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1005 and earlier allows remote attackers to hijack the authentication of arbitrary users. Ryoya Tsukasaki of Urawa Commercial High School reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged in, unintended operations may be performed. NTTHikariDenwaPR-400MI, RV-440MI and RT-400MI are all router products of Japan Telecom Telephone (NTT). An attacker could exploit the vulnerability to perform unauthorized actions. This may aid in other attacks. The following products and versions are affected: NTT Hikari Denwa PR-400MI, RV-440MI, RT-400MI using firmware version 07.00.1006 and earlier, Hikari Denwa PR-400MI, RV-440MI, RT using firmware version 07.00.1005 and earlier -400MI", "sources": [ { "db": "NVD", "id": "CVE-2016-1228" }, { "db": "JVNDB", "id": "JVNDB-2016-000106" }, { "db": "CNVD", "id": "CNVD-2016-04402" }, { "db": "BID", "id": "91462" }, { "db": "VULHUB", "id": "VHN-90047" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1228", "trust": 3.4 }, { "db": "JVN", "id": "JVN45034304", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2016-000106", "trust": 3.1 }, { "db": "CNNVD", "id": "CNNVD-201606-604", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-04402", "trust": 0.6 }, { "db": "BID", "id": "91462", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-90047", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04402" }, { "db": "VULHUB", "id": "VHN-90047" }, { "db": "BID", "id": "91462" }, { "db": "JVNDB", "id": "JVNDB-2016-000106" }, { "db": "NVD", "id": "CVE-2016-1228" }, { "db": "CNNVD", "id": "CNNVD-201606-604" } ] }, "id": "VAR-201607-0312", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-04402" }, { "db": "VULHUB", "id": "VHN-90047" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04402" } ] }, "last_update_date": "2023-12-18T13:39:10.633000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION website", "trust": 0.8, "url": "http://web116.jp/ced/support/news/contents/2016/20160627.html" }, { "title": "NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION website", "trust": 0.8, "url": "http://www.ntt-west.co.jp/kiki/support/flets/hgw4_mi/160627.html" }, { "title": "Patches for multiple NTTHikariDenwa products across site request forgery vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/78396" }, { "title": "Multiple NTT Hikari Denwa Repair measures for product cross-site request forgery vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=62513" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04402" }, { "db": "JVNDB", "id": "JVNDB-2016-000106" }, { "db": "CNNVD", "id": "CNNVD-201606-604" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90047" }, { "db": "JVNDB", "id": "JVNDB-2016-000106" }, { "db": "NVD", "id": "CVE-2016-1228" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://jvn.jp/en/jp/jvn45034304/index.html" }, { "trust": 2.3, "url": "http://jvndb.jvn.jp/jvndb/jvndb-2016-000106" }, { "trust": 1.7, "url": "http://web116.jp/ced/support/news/contents/2016/20160627.html" }, { "trust": 1.7, "url": "http://www.ntt-west.co.jp/kiki/support/flets/hgw4_mi/160627.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1228" }, { "trust": 0.8, "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1228" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04402" }, { "db": "VULHUB", "id": "VHN-90047" }, { "db": "JVNDB", "id": "JVNDB-2016-000106" }, { "db": "NVD", "id": "CVE-2016-1228" }, { "db": "CNNVD", "id": "CNNVD-201606-604" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-04402" }, { "db": "VULHUB", "id": "VHN-90047" }, { "db": "BID", "id": "91462" }, { "db": "JVNDB", "id": "JVNDB-2016-000106" }, { "db": "NVD", "id": "CVE-2016-1228" }, { "db": "CNNVD", "id": "CNNVD-201606-604" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-07-01T00:00:00", "db": "CNVD", "id": "CNVD-2016-04402" }, { "date": "2016-07-03T00:00:00", "db": "VULHUB", "id": "VHN-90047" }, { "date": "2016-06-27T00:00:00", "db": "BID", "id": "91462" }, { "date": "2016-06-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-000106" }, { "date": "2016-07-03T14:59:02.587000", "db": "NVD", "id": "CVE-2016-1228" }, { "date": "2016-06-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201606-604" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-07-01T00:00:00", "db": "CNVD", "id": "CNVD-2016-04402" }, { "date": "2016-07-08T00:00:00", "db": "VULHUB", "id": "VHN-90047" }, { "date": "2016-07-06T15:06:00", "db": "BID", "id": "91462" }, { "date": "2016-08-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-000106" }, { "date": "2021-07-30T15:25:10.287000", "db": "NVD", "id": "CVE-2016-1228" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201606-604" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201606-604" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Hikari Denwa routers vulnerable to cross-site request forgery", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-000106" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-201606-604" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.