var-200601-0295
Vulnerability from variot
Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644. Cisco IOS Wireless access point that operates Cisco Aironet Wireless Access Points (WAP) Is illegal ARP When processing a request, there is a vulnerability where the physical memory on the device is exhausted and traffic cannot be processed.Device is out of service (DoS) It may be in a state. This issue is due to memory exhaustion caused by improper handling of an excessive number of ARP requests. This issue allows attackers who can successfully associate with a vulnerable access point to exhaust the memory of the affected device. As a result, the device fails to pass legitimate traffic until it has been rebooted. There is a loophole in Cisco Aironet's processing of ARP requests, and a remote attacker may use the loophole to carry out a denial of service attack on the device. This will cause the device to be unable to transmit traffic until it is powered off and reloaded, affecting the availability of the wireless access point, and may not be able to use management and packet forwarding services. This can be exploited by sending spoofed ARP messages to the management interface of the AP to continuously add entries to the ARP table of the device until the device runs out of memory.
Successful exploitation causes the AP to be unable to pass traffic until the device is restarted, but requires the ability to send ARP messages to the management interface of the AP.
SOLUTION: Update to IOS version 12.3-7-JA2. http://tools.cisco.com/support/downloads/pub/MDFTree.x?butype=wireless
PROVIDED AND/OR DISCOVERED BY: Reported by vendor.
ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200601-0295", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "aironet ap1230ag", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "aironet ap1240ag", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "aironet ap1200", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "aironet ap1300", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "aironet ap350", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "aironet ap1130ag", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "aironet ap1100", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "aironet ap1400", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "12.3" }, { "model": "aironet ap1240ag", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "aironet ap1230ag", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "aironet ap1300", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "aironet ap1200", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "aironet ap1400", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "aironet ap1130ag", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "aironet ap350", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "aironet ap1100", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "aironet ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "350" }, { "model": "aironet", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1400" }, { "model": "aironet", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1300" }, { "model": "aironet 1240ag", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "aironet 1230ag", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "aironet", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1200" }, { "model": "aironet 1130ag", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "aironet", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1100" }, { "model": "ios -7-ja2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.3" } ], "sources": [ { "db": "BID", "id": "16217" }, { "db": "JVNDB", "id": "JVNDB-2006-000019" }, { "db": "CNNVD", "id": "CNNVD-200601-286" }, { "db": "NVD", "id": "CVE-2006-0354" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:cisco:ios", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-000019" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Eric Smith", "sources": [ { "db": "CNNVD", "id": "CNNVD-200601-286" } ], "trust": 0.6 }, "cve": "CVE-2006-0354", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 5.5, "confidentialityImpact": "NONE", "exploitabilityScore": 5.1, "id": "CVE-2006-0354", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2006-0354", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 5.5, "confidentialityImpact": "NONE", "exploitabilityScore": 5.1, "id": "VHN-16462", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:S/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2006-0354", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2006-0354", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200601-286", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-16462", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-16462" }, { "db": "JVNDB", "id": "JVNDB-2006-000019" }, { "db": "CNNVD", "id": "CNNVD-200601-286" }, { "db": "NVD", "id": "CVE-2006-0354" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644. Cisco IOS Wireless access point that operates Cisco Aironet Wireless Access Points (WAP) Is illegal ARP When processing a request, there is a vulnerability where the physical memory on the device is exhausted and traffic cannot be processed.Device is out of service (DoS) It may be in a state. This issue is due to memory exhaustion caused by improper handling of an excessive number of ARP requests. \nThis issue allows attackers who can successfully associate with a vulnerable access point to exhaust the memory of the affected device. As a result, the device fails to pass legitimate traffic until it has been rebooted. There is a loophole in Cisco Aironet\u0027s processing of ARP requests, and a remote attacker may use the loophole to carry out a denial of service attack on the device. This will cause the device to be unable to transmit traffic until it is powered off and reloaded, affecting the availability of the wireless access point, and may not be able to use management and packet forwarding services. This can be exploited by sending spoofed ARP\nmessages to the management interface of the AP to continuously add\nentries to the ARP table of the device until the device runs out of\nmemory. \n\nSuccessful exploitation causes the AP to be unable to pass traffic\nuntil the device is restarted, but requires the ability to send ARP\nmessages to the management interface of the AP. \n\nSOLUTION:\nUpdate to IOS version 12.3-7-JA2. \nhttp://tools.cisco.com/support/downloads/pub/MDFTree.x?butype=wireless\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by vendor. \n\nORIGINAL ADVISORY:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-0354" }, { "db": "JVNDB", "id": "JVNDB-2006-000019" }, { "db": "BID", "id": "16217" }, { "db": "VULHUB", "id": "VHN-16462" }, { "db": "PACKETSTORM", "id": "43033" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-16462", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-16462" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "16217", "trust": 2.8 }, { "db": "SECUNIA", "id": "18430", "trust": 2.6 }, { "db": "NVD", "id": "CVE-2006-0354", "trust": 2.5 }, { "db": "SECTRACK", "id": "1015483", "trust": 1.7 }, { "db": "OSVDB", "id": "22375", "trust": 1.7 }, { "db": "SREASON", "id": "339", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2006-0176", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2006-000019", "trust": 0.8 }, { "db": "CISCO", "id": "20060112 ACCESS POINT MEMORY EXHAUSTION FROM ARP ATTACKS", "trust": 0.6 }, { "db": "XF", "id": "24086", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:5680", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200601-286", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "1447", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-16462", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "43033", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-16462" }, { "db": "BID", "id": "16217" }, { "db": "JVNDB", "id": "JVNDB-2006-000019" }, { "db": "PACKETSTORM", "id": "43033" }, { "db": "CNNVD", "id": "CNNVD-200601-286" }, { "db": "NVD", "id": "CVE-2006-0354" } ] }, "id": "VAR-200601-0295", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-16462" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T23:00:31.982000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20060112-wireless", "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml" }, { "title": "cisco-sa-20060112-wireless", "trust": 0.8, "url": "http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/cisco-sa-20060112-wireless-j.shtml" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-000019" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-16462" }, { "db": "JVNDB", "id": "JVNDB-2006-000019" }, { "db": "NVD", "id": "CVE-2006-0354" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/16217" }, { "trust": 2.1, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml" }, { "trust": 1.7, "url": "http://www.osvdb.org/22375" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1015483" }, { "trust": 1.7, "url": "http://secunia.com/advisories/18430" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/339" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2006/0176" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5680" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/0176" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24086" }, { "trust": 0.9, "url": "http://secunia.com/advisories/18430/" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0354" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-0354" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/24086" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5680" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/hw/wireless/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/6794/" }, { "trust": 0.1, "url": "http://secunia.com/product/6037/" }, { "trust": 0.1, "url": "http://secunia.com/product/6795/" }, { "trust": 0.1, "url": "http://tools.cisco.com/support/downloads/pub/mdftree.x?butype=wireless" }, { "trust": 0.1, "url": "http://secunia.com/product/1930/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/5114/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/6034/" }, { "trust": 0.1, "url": "http://secunia.com/product/1929/" }, { "trust": 0.1, "url": "http://secunia.com/product/1928/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-16462" }, { "db": "BID", "id": "16217" }, { "db": "JVNDB", "id": "JVNDB-2006-000019" }, { "db": "PACKETSTORM", "id": "43033" }, { "db": "CNNVD", "id": "CNNVD-200601-286" }, { "db": "NVD", "id": "CVE-2006-0354" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-16462" }, { "db": "BID", "id": "16217" }, { "db": "JVNDB", "id": "JVNDB-2006-000019" }, { "db": "PACKETSTORM", "id": "43033" }, { "db": "CNNVD", "id": "CNNVD-200601-286" }, { "db": "NVD", "id": "CVE-2006-0354" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-01-22T00:00:00", "db": "VULHUB", "id": "VHN-16462" }, { "date": "2006-01-12T00:00:00", "db": "BID", "id": "16217" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-000019" }, { "date": "2006-01-14T05:07:24", "db": "PACKETSTORM", "id": "43033" }, { "date": "2006-01-22T00:00:00", "db": "CNNVD", "id": "CNNVD-200601-286" }, { "date": "2006-01-22T20:03:00", "db": "NVD", "id": "CVE-2006-0354" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-10-11T00:00:00", "db": "VULHUB", "id": "VHN-16462" }, { "date": "2006-02-07T20:55:00", "db": "BID", "id": "16217" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-000019" }, { "date": "2009-03-04T00:00:00", "db": "CNNVD", "id": "CNNVD-200601-286" }, { "date": "2024-11-21T00:06:16.297000", "db": "NVD", "id": "CVE-2006-0354" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "specific network environment", "sources": [ { "db": "CNNVD", "id": "CNNVD-200601-286" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Aironet WAP of ARP Service disruption due to request processing (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-000019" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200601-286" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.