VAR-201710-0797
Vulnerability from variot - Updated: 2023-12-18 12:57An Improper Authentication issue was discovered in Ctek SkyRouter Series 4200 and 4400, all versions prior to V6.00.11. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access the application without authenticating. Ctek SkyRouter Series 4200 and 4400 Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SkyRouter is a product of the Swedish CTEK company that manages wireless IP connections. Ctek SkyRouter is prone to an authentication-bypass vulnerability. This may lead to further attacks. Versions prior to ICtek SkyRouter 6.00.11 are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201710-0797",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "skyrouter z4400",
"scope": "lte",
"trust": 1.0,
"vendor": "ctekproducts",
"version": "6.00.05"
},
{
"model": "skyrouter z4200",
"scope": "lte",
"trust": 1.0,
"vendor": "ctekproducts",
"version": "6.00.05"
},
{
"model": "skyrouter series 4400",
"scope": "eq",
"trust": 0.8,
"vendor": "ctek",
"version": "6.00.11"
},
{
"model": "skyrouter series 4400",
"scope": "lt",
"trust": 0.8,
"vendor": "ctek",
"version": "all versions"
},
{
"model": "skyrouter series 4200",
"scope": "eq",
"trust": 0.8,
"vendor": "ctek",
"version": "6.00.11"
},
{
"model": "skyrouter series 4200",
"scope": "lt",
"trust": 0.8,
"vendor": "ctek",
"version": "all versions"
},
{
"model": "skyrouter series",
"scope": "eq",
"trust": 0.6,
"vendor": "ctek",
"version": "4200\u003c6.00.11"
},
{
"model": "skyrouter series",
"scope": "eq",
"trust": 0.6,
"vendor": "ctek",
"version": "4400\u003c6.00.11"
},
{
"model": "skyrouter z4400",
"scope": "eq",
"trust": 0.6,
"vendor": "ctekproducts",
"version": "6.00.05"
},
{
"model": "skyrouter z4200",
"scope": "eq",
"trust": 0.6,
"vendor": "ctekproducts",
"version": "6.00.05"
},
{
"model": "skyrouter",
"scope": "eq",
"trust": 0.3,
"vendor": "ctek",
"version": "43000"
},
{
"model": "skyrouter",
"scope": "eq",
"trust": 0.3,
"vendor": "ctek",
"version": "42000"
},
{
"model": "skyrouter",
"scope": "ne",
"trust": 0.3,
"vendor": "ctek",
"version": "43006.00.11"
},
{
"model": "skyrouter",
"scope": "ne",
"trust": 0.3,
"vendor": "ctek",
"version": "42006.00.11"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "skyrouter z4200",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "skyrouter z4400",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "964483ce-3df4-4a34-9699-435e11647a62"
},
{
"db": "CNVD",
"id": "CNVD-2017-27938"
},
{
"db": "BID",
"id": "100953"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009406"
},
{
"db": "NVD",
"id": "CVE-2017-14000"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1091"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:ctekproducts:skyrouter_z4200_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.00.05",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ctekproducts:skyrouter_z4200:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:ctekproducts:skyrouter_z4400_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.00.05",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ctekproducts:skyrouter_z4400:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-14000"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Maxim Rupp",
"sources": [
{
"db": "BID",
"id": "100953"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1091"
}
],
"trust": 0.9
},
"cve": "CVE-2017-14000",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": true,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2017-14000",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-27938",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "964483ce-3df4-4a34-9699-435e11647a62",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-104679",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.5,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "Low",
"baseScore": 9.4,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2017-14000",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-14000",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2017-27938",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201709-1091",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "964483ce-3df4-4a34-9699-435e11647a62",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-104679",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "964483ce-3df4-4a34-9699-435e11647a62"
},
{
"db": "CNVD",
"id": "CNVD-2017-27938"
},
{
"db": "VULHUB",
"id": "VHN-104679"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009406"
},
{
"db": "NVD",
"id": "CVE-2017-14000"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1091"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An Improper Authentication issue was discovered in Ctek SkyRouter Series 4200 and 4400, all versions prior to V6.00.11. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access the application without authenticating. Ctek SkyRouter Series 4200 and 4400 Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SkyRouter is a product of the Swedish CTEK company that manages wireless IP connections. Ctek SkyRouter is prone to an authentication-bypass vulnerability. This may lead to further attacks. \nVersions prior to ICtek SkyRouter 6.00.11 are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-14000"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009406"
},
{
"db": "CNVD",
"id": "CNVD-2017-27938"
},
{
"db": "BID",
"id": "100953"
},
{
"db": "IVD",
"id": "964483ce-3df4-4a34-9699-435e11647a62"
},
{
"db": "VULHUB",
"id": "VHN-104679"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-14000",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-17-264-02",
"trust": 3.4
},
{
"db": "BID",
"id": "100953",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1091",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-27938",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009406",
"trust": 0.8
},
{
"db": "IVD",
"id": "964483CE-3DF4-4A34-9699-435E11647A62",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-104679",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "964483ce-3df4-4a34-9699-435e11647a62"
},
{
"db": "CNVD",
"id": "CNVD-2017-27938"
},
{
"db": "VULHUB",
"id": "VHN-104679"
},
{
"db": "BID",
"id": "100953"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009406"
},
{
"db": "NVD",
"id": "CVE-2017-14000"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1091"
}
]
},
"id": "VAR-201710-0797",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "964483ce-3df4-4a34-9699-435e11647a62"
},
{
"db": "CNVD",
"id": "CNVD-2017-27938"
},
{
"db": "VULHUB",
"id": "VHN-104679"
}
],
"trust": 1.6916666500000002
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "964483ce-3df4-4a34-9699-435e11647a62"
},
{
"db": "CNVD",
"id": "CNVD-2017-27938"
}
]
},
"last_update_date": "2023-12-18T12:57:11.826000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.ctekproducts.com/"
},
{
"title": "CtekSkyRouter authentication bypass vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/102618"
},
{
"title": "Ctek SkyRouter Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=75078"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-27938"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009406"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1091"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-104679"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009406"
},
{
"db": "NVD",
"id": "CVE-2017-14000"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-264-02"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/100953"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14000"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-14000"
},
{
"trust": 0.3,
"url": "http://www.ctekproducts.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-27938"
},
{
"db": "VULHUB",
"id": "VHN-104679"
},
{
"db": "BID",
"id": "100953"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009406"
},
{
"db": "NVD",
"id": "CVE-2017-14000"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1091"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "964483ce-3df4-4a34-9699-435e11647a62"
},
{
"db": "CNVD",
"id": "CNVD-2017-27938"
},
{
"db": "VULHUB",
"id": "VHN-104679"
},
{
"db": "BID",
"id": "100953"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009406"
},
{
"db": "NVD",
"id": "CVE-2017-14000"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1091"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-09-22T00:00:00",
"db": "IVD",
"id": "964483ce-3df4-4a34-9699-435e11647a62"
},
{
"date": "2017-09-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-27938"
},
{
"date": "2017-10-05T00:00:00",
"db": "VULHUB",
"id": "VHN-104679"
},
{
"date": "2017-09-21T00:00:00",
"db": "BID",
"id": "100953"
},
{
"date": "2017-11-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-009406"
},
{
"date": "2017-10-05T01:29:05.273000",
"db": "NVD",
"id": "CVE-2017-14000"
},
{
"date": "2017-09-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201709-1091"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-09-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-27938"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-104679"
},
{
"date": "2017-09-21T00:00:00",
"db": "BID",
"id": "100953"
},
{
"date": "2017-11-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-009406"
},
{
"date": "2019-10-09T23:23:42.187000",
"db": "NVD",
"id": "CVE-2017-14000"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201709-1091"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201709-1091"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ctek SkyRouter Authentication Bypass Vulnerability",
"sources": [
{
"db": "IVD",
"id": "964483ce-3df4-4a34-9699-435e11647a62"
},
{
"db": "CNVD",
"id": "CNVD-2017-27938"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201709-1091"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…