VAR-200512-0918
Vulnerability from variot - Updated: 2025-04-03 22:10D-Link DI-524 Wireless Router, DI-624 Wireless Router, and DI-784 allow remote attackers to cause a denial of service (device reboot) via a series of crafted fragmented UDP packets, possibly involving a missing fragment. D-Link is an internationally renowned provider of network equipment and solutions, and its products include a variety of router equipment.
D-Link's multiple wireless access routers have a denial of service vulnerability. Remote attackers may use this vulnerability to conduct denial of service attacks on devices.
If the attacker sends three consecutive fragmented UDP packets as follows, the device will restart:
The IP header of all messages must have the same Identification Number.
Message 1:
The MORE_FRAGMENTS flag must be set to 1 (IP_MF)
Debris offset = 0
The effective part size of the message is 8 bytes. Null bytes were used in the attack code.
Message 2:
Set the MORE_FRAGMENTS flag to 1 (0x2002)
Debris offset = 16
The valid part is 8 bytes long.
Message 3:
Set the MORE_FRAGMENTS flag to 0 (0x0003)
Debris offset = 24
The valid part is 8 bytes long.
Upon receiving the above message, the affected router will immediately terminate all current connections. DI-524 takes about 1 minute to restart to restore the connection, and DI-624 takes about 30 seconds to restart. This issue is due to a flaw in affected devices that causes them to fail when attempting to reassemble certain IP packets. D-Link DI-524, DI-624, and Di-784 devices are affected by this issue. Due to code reuse among routers, other devices may also be affected. It is reported that US Robotics USR8054 devices are also affected. D-Link is a network company founded by Taiwan D-Link Group, dedicated to the R&D, production and marketing of LAN, broadband network, wireless network, voice network and related network equipment.
TITLE: D-Link Wireless Access Point Denial of Service Vulnerability
SECUNIA ADVISORY ID: SA18833
VERIFY ADVISORY: http://secunia.com/advisories/18833/
CRITICAL: Moderately critical
IMPACT: DoS
WHERE:
From remote
OPERATING SYSTEM: D-Link DI-784 http://secunia.com/product/8029/ D-Link DI-624 http://secunia.com/product/3660/ D-Link DI-524 http://secunia.com/product/8028/
DESCRIPTION: Aaron Portnoy and Keefe Johnson has reported a vulnerability in D-Link Wireless Access Point, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error in the handling of fragmented UDP packets.
The vulnerability has been reported in the following products: * D-Link DI-524 Wireless Router (firmware version 3.20 August 18, 2005). * D-Link DI-624 Wireless Router. * D-Link DI-784.
SOLUTION: The vulnerability has reportedly been fixed in the latest firmware.
PROVIDED AND/OR DISCOVERED BY: Aaron Portnoy and Keefe Johnson
ORIGINAL ADVISORY: http://www.thunkers.net/~deft/advisories/dlink_udp_dos.txt
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200512-0918",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "di-524",
"scope": "eq",
"trust": 1.9,
"vendor": "d link",
"version": "3.20"
},
{
"model": "di-624",
"scope": "eq",
"trust": 1.0,
"vendor": "dlink",
"version": "*"
},
{
"model": "di-784",
"scope": "eq",
"trust": 1.0,
"vendor": "d link",
"version": "*"
},
{
"model": "di-524",
"scope": "eq",
"trust": 1.0,
"vendor": "dlink",
"version": "*"
},
{
"model": null,
"scope": null,
"trust": 0.6,
"vendor": "none",
"version": null
},
{
"model": "di-784",
"scope": null,
"trust": 0.6,
"vendor": "d link",
"version": null
},
{
"model": "di-524",
"scope": null,
"trust": 0.6,
"vendor": "d link",
"version": null
},
{
"model": "di-624",
"scope": null,
"trust": 0.6,
"vendor": "d link",
"version": null
},
{
"model": "usr8054",
"scope": "eq",
"trust": 0.3,
"vendor": "u s robotics",
"version": "0"
},
{
"model": "di-784",
"scope": "eq",
"trust": 0.3,
"vendor": "d link",
"version": "0"
},
{
"model": "di-624",
"scope": "eq",
"trust": 0.3,
"vendor": "d link",
"version": "0"
},
{
"model": "di-524",
"scope": "eq",
"trust": 0.3,
"vendor": "d link",
"version": "0"
},
{
"model": "di-614+",
"scope": "ne",
"trust": 0.3,
"vendor": "d link",
"version": "2.30"
},
{
"model": "di-614+",
"scope": "ne",
"trust": 0.3,
"vendor": "d link",
"version": "2.18"
},
{
"model": "di-614+",
"scope": "ne",
"trust": 0.3,
"vendor": "d link",
"version": "2.10"
},
{
"model": "di-614+ f",
"scope": "ne",
"trust": 0.3,
"vendor": "d link",
"version": "2.0"
},
{
"model": "di-614+ 3g",
"scope": "ne",
"trust": 0.3,
"vendor": "d link",
"version": "2.0"
},
{
"model": "di-614+",
"scope": "ne",
"trust": 0.3,
"vendor": "d link",
"version": "2.03"
},
{
"model": "di-614+",
"scope": "ne",
"trust": 0.3,
"vendor": "d link",
"version": "2.0"
},
{
"model": "di-604",
"scope": "ne",
"trust": 0.3,
"vendor": "d link",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-0807"
},
{
"db": "BID",
"id": "16621"
},
{
"db": "CNNVD",
"id": "CNNVD-200512-848"
},
{
"db": "NVD",
"id": "CVE-2005-4723"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Aaron Portnoy aportnoy@ccs.neu.edu",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200512-848"
}
],
"trust": 0.6
},
"cve": "CVE-2005-4723",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2005-4723",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-15931",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2005-4723",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200512-848",
"trust": 0.6,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-15931",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-15931"
},
{
"db": "CNNVD",
"id": "CNNVD-200512-848"
},
{
"db": "NVD",
"id": "CVE-2005-4723"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "D-Link DI-524 Wireless Router, DI-624 Wireless Router, and DI-784 allow remote attackers to cause a denial of service (device reboot) via a series of crafted fragmented UDP packets, possibly involving a missing fragment. D-Link is an internationally renowned provider of network equipment and solutions, and its products include a variety of router equipment. \n\n\u00a0D-Link\u0027s multiple wireless access routers have a denial of service vulnerability. Remote attackers may use this vulnerability to conduct denial of service attacks on devices. \n\n\u00a0If the attacker sends three consecutive fragmented UDP packets as follows, the device will restart:\n\n\u00a0The IP header of all messages must have the same Identification Number. \n\n\u00a0Message 1:\n\n\u00a0The MORE_FRAGMENTS flag must be set to 1 (IP_MF)\n\n\u00a0Debris offset = 0\n\n\u00a0The effective part size of the message is 8 bytes. Null bytes were used in the attack code. \n\n\u00a0Message 2:\n\n\u00a0Set the MORE_FRAGMENTS flag to 1 (0x2002)\n\n\u00a0Debris offset = 16\n\n\u00a0The valid part is 8 bytes long. \n\n\u00a0Message 3:\n\n\u00a0Set the MORE_FRAGMENTS flag to 0 (0x0003)\n\n\u00a0Debris offset = 24\n\n\u00a0The valid part is 8 bytes long. \n\n\u00a0Upon receiving the above message, the affected router will immediately terminate all current connections. DI-524 takes about 1 minute to restart to restore the connection, and DI-624 takes about 30 seconds to restart. This issue is due to a flaw in affected devices that causes them to fail when attempting to reassemble certain IP packets. \nD-Link DI-524, DI-624, and Di-784 devices are affected by this issue. Due to code reuse among routers, other devices may also be affected. \nIt is reported that US Robotics USR8054 devices are also affected. D-Link is a network company founded by Taiwan D-Link Group, dedicated to the R\u0026D, production and marketing of LAN, broadband network, wireless network, voice network and related network equipment. \n\nTITLE:\nD-Link Wireless Access Point Denial of Service Vulnerability\n\nSECUNIA ADVISORY ID:\nSA18833\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/18833/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nD-Link DI-784\nhttp://secunia.com/product/8029/\nD-Link DI-624\nhttp://secunia.com/product/3660/\nD-Link DI-524\nhttp://secunia.com/product/8028/\n\nDESCRIPTION:\nAaron Portnoy and Keefe Johnson has reported a vulnerability in\nD-Link Wireless Access Point, which potentially can be exploited by\nmalicious people to cause a DoS (Denial of Service). \n\nThe vulnerability is caused due to an error in the handling of\nfragmented UDP packets. \n\nThe vulnerability has been reported in the following products:\n* D-Link DI-524 Wireless Router (firmware version 3.20 August 18,\n2005). \n* D-Link DI-624 Wireless Router. \n* D-Link DI-784. \n\nSOLUTION:\nThe vulnerability has reportedly been fixed in the latest firmware. \n\nPROVIDED AND/OR DISCOVERED BY:\nAaron Portnoy and Keefe Johnson\n\nORIGINAL ADVISORY:\nhttp://www.thunkers.net/~deft/advisories/dlink_udp_dos.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2005-4723"
},
{
"db": "CNVD",
"id": "CNVD-2006-0807"
},
{
"db": "BID",
"id": "16621"
},
{
"db": "VULHUB",
"id": "VHN-15931"
},
{
"db": "PACKETSTORM",
"id": "43828"
}
],
"trust": 1.89
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-15931",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-15931"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2005-4723",
"trust": 2.3
},
{
"db": "BID",
"id": "16621",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "18833",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2006-0563",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-200512-848",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2006-0807",
"trust": 0.6
},
{
"db": "EXPLOIT-DB",
"id": "1496",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-15931",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "43828",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-0807"
},
{
"db": "VULHUB",
"id": "VHN-15931"
},
{
"db": "BID",
"id": "16621"
},
{
"db": "PACKETSTORM",
"id": "43828"
},
{
"db": "CNNVD",
"id": "CNNVD-200512-848"
},
{
"db": "NVD",
"id": "CVE-2005-4723"
}
]
},
"id": "VAR-200512-0918",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-0807"
},
{
"db": "VULHUB",
"id": "VHN-15931"
}
],
"trust": 1.2214285999999999
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-0807"
}
]
},
"last_update_date": "2025-04-03T22:10:45.588000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2005-4723"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://www.thunkers.net/~deft/advisories/dlink_udp_dos.txt"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/16621"
},
{
"trust": 1.7,
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0188.html"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/18833"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2006/0563"
},
{
"trust": 1.7,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24631"
},
{
"trust": 0.3,
"url": "http://thunkers.net/~deft/advisories/dlink_udp_dos.txt"
},
{
"trust": 0.3,
"url": "http://www.usr.com/"
},
{
"trust": 0.3,
"url": "http://www.d-link.com/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/8029/"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/8028/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/18833/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/3660/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-15931"
},
{
"db": "BID",
"id": "16621"
},
{
"db": "PACKETSTORM",
"id": "43828"
},
{
"db": "CNNVD",
"id": "CNNVD-200512-848"
},
{
"db": "NVD",
"id": "CVE-2005-4723"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2006-0807"
},
{
"db": "VULHUB",
"id": "VHN-15931"
},
{
"db": "BID",
"id": "16621"
},
{
"db": "PACKETSTORM",
"id": "43828"
},
{
"db": "CNNVD",
"id": "CNNVD-200512-848"
},
{
"db": "NVD",
"id": "CVE-2005-4723"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2006-02-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2006-0807"
},
{
"date": "2005-12-31T00:00:00",
"db": "VULHUB",
"id": "VHN-15931"
},
{
"date": "2006-02-13T00:00:00",
"db": "BID",
"id": "16621"
},
{
"date": "2006-02-14T20:21:41",
"db": "PACKETSTORM",
"id": "43828"
},
{
"date": "2005-12-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200512-848"
},
{
"date": "2005-12-31T05:00:00",
"db": "NVD",
"id": "CVE-2005-4723"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2006-02-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2006-0807"
},
{
"date": "2017-07-20T00:00:00",
"db": "VULHUB",
"id": "VHN-15931"
},
{
"date": "2006-02-14T18:53:00",
"db": "BID",
"id": "16621"
},
{
"date": "2023-04-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200512-848"
},
{
"date": "2025-04-03T01:03:51.193000",
"db": "NVD",
"id": "CVE-2005-4723"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200512-848"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple D-Link Products IP Packet Reassembly Denial of Service Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-0807"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200512-848"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.