VAR-200608-0223

Vulnerability from variot - Updated: 2025-04-03 22:18

Hewlett-Packard (HP) ProCurve 3500yl, 6200yl, and 5400zl switches with software before K.11.33 allow remote attackers to cause a denial of service (possibly memory leak or system crash) via unknown vectors. ProCurve is prone to an unspecified remote denial-of-service vulnerability. This issue is most likely due to a failure in the device to properly sanitize user-supplied input. An attacker can exploit this issue to crash an affected device, effectively denying service to legitimate users. This issue affects ProCurve switches running software prior to K.11.33. Remote attackers can cause the switch to deny service by sending specially crafted packets.


Hardcore Disassembler / Reverse Engineer Wanted!

Want to work with IDA and BinDiff? Want to write PoC's and Exploits?

Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package.

http://secunia.com/hardcore_disassembler_and_reverse_engineer/


TITLE: HP ProCurve Switch Denial of Service Vulnerability

SECUNIA ADVISORY ID: SA21316

VERIFY ADVISORY: http://secunia.com/advisories/21316/

CRITICAL: Less critical

IMPACT: DoS

WHERE:

From local network

OPERATING SYSTEM: HP ProCurve Switch 3500yl series http://secunia.com/product/11225/ HP ProCurve Switch 5400zl series http://secunia.com/product/11226/ HP ProCurve Switch 6200yl series http://secunia.com/product/11227/

DESCRIPTION: A vulnerability has been reported in HP ProCurve Switch, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability has been reported in the following products: * ProCurve Switch 3500yl series * ProCurve Switch 6200yl series * ProCurve Switch 5400zl series

SOLUTION: Update switch software to version K.11.33 or later. http://www.hp.com/rnd/software/switches.htm

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: HPSBGN02136 SSRT061173: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00732233


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200608-0223",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "procurve switch 6200yl",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": "k.11.32"
      },
      {
        "model": "procurve switch 5400zl",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hp",
        "version": "k.11.32"
      },
      {
        "model": "procurve switch 3500yl",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hp",
        "version": "k.11.32"
      },
      {
        "model": "procurve switch 6200yl",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp 5400 zl switch series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "k.11.33"
      },
      {
        "model": "hp 5400 zl switch series",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "5400zl"
      },
      {
        "model": "procurve switch 3500yl",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "procurve switch 5400zl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "k.11.32"
      },
      {
        "model": "procurve switch 3500yl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "k.11.32"
      },
      {
        "model": "procurve switch 6200yl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "0"
      },
      {
        "model": "procurve switch 5400zl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "0"
      },
      {
        "model": "procurve switch 3500yl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "19310"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-001923"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200608-080"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-4015"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:hp:procurve_switch_5400zl",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:procurve_switch_3500yl",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:procurve_switch_6200yl",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-001923"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "HP Security Bulletin security-alert@hp.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200608-080"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2006-4015",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2006-4015",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-20123",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2006-4015",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2006-4015",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200608-080",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-20123",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-20123"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-001923"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200608-080"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-4015"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Hewlett-Packard (HP) ProCurve 3500yl, 6200yl, and 5400zl switches with software before K.11.33 allow remote attackers to cause a denial of service (possibly memory leak or system crash) via unknown vectors. ProCurve is prone to an unspecified remote denial-of-service vulnerability. This issue is most likely due to a failure in the device to properly sanitize user-supplied input. \nAn attacker can exploit this issue to crash an affected device, effectively denying service to legitimate users. \nThis issue affects ProCurve switches running software prior to K.11.33. Remote attackers can cause the switch to deny service by sending specially crafted packets. \n\n----------------------------------------------------------------------\n\nHardcore Disassembler / Reverse Engineer Wanted!\n\nWant to work with IDA and BinDiff?\nWant to write PoC\u0027s and Exploits?\n\nYour nationality is not important. \nWe will get you a work permit, find an apartment, and offer a\nrelocation compensation package. \n\nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\n----------------------------------------------------------------------\n\nTITLE:\nHP ProCurve Switch Denial of Service Vulnerability\n\nSECUNIA ADVISORY ID:\nSA21316\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/21316/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom local network\n\nOPERATING SYSTEM:\nHP ProCurve Switch 3500yl series\nhttp://secunia.com/product/11225/\nHP ProCurve Switch 5400zl series\nhttp://secunia.com/product/11226/\nHP ProCurve Switch 6200yl series\nhttp://secunia.com/product/11227/\n\nDESCRIPTION:\nA vulnerability has been reported in HP ProCurve Switch, which can be\nexploited by malicious people to cause a DoS (Denial of Service). \n\nThe vulnerability has been reported in the following products:\n* ProCurve Switch 3500yl series\n* ProCurve Switch 6200yl series\n* ProCurve Switch 5400zl series\n\nSOLUTION:\nUpdate switch software to version K.11.33 or later. \nhttp://www.hp.com/rnd/software/switches.htm\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nHPSBGN02136 SSRT061173:\nhttp://itrc.hp.com/service/cki/docDisplay.do?docId=c00732233\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-4015"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-001923"
      },
      {
        "db": "BID",
        "id": "19310"
      },
      {
        "db": "VULHUB",
        "id": "VHN-20123"
      },
      {
        "db": "PACKETSTORM",
        "id": "48806"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2006-4015",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "19310",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "21316",
        "trust": 1.8
      },
      {
        "db": "SREASON",
        "id": "1335",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1016623",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-3136",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-001923",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200608-080",
        "trust": 0.7
      },
      {
        "db": "HP",
        "id": "SSRT061173",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-20123",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "48806",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-20123"
      },
      {
        "db": "BID",
        "id": "19310"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-001923"
      },
      {
        "db": "PACKETSTORM",
        "id": "48806"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200608-080"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-4015"
      }
    ]
  },
  "id": "VAR-200608-0223",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-20123"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T22:18:53.215000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HP Security Notice HPSN-2011-001",
        "trust": 0.8,
        "url": "https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?javax.portlet.tpst=ba847bafb2a2d782fcbb0710b053ce01\u0026javax.portlet.prp_ba847bafb2a2d782fcbb0710b053ce01=wsrp-navigationalState%3DdocId%25253Dc00732233%25257CdocLocale%25253Den\u0026"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-001923"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-4015"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/19310"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1016623"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/21316"
      },
      {
        "trust": 1.7,
        "url": "http://securityreason.com/securityalert/1335"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/442033/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2006/3136"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4015"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4015"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/442033/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/3136"
      },
      {
        "trust": 0.3,
        "url": "http://www.hp.com/rnd/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/21316/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/11226/"
      },
      {
        "trust": 0.1,
        "url": "http://www.hp.com/rnd/software/switches.htm"
      },
      {
        "trust": 0.1,
        "url": "http://itrc.hp.com/service/cki/docdisplay.do?docid=c00732233"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/11225/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/11227/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-20123"
      },
      {
        "db": "BID",
        "id": "19310"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-001923"
      },
      {
        "db": "PACKETSTORM",
        "id": "48806"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200608-080"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-4015"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-20123"
      },
      {
        "db": "BID",
        "id": "19310"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-001923"
      },
      {
        "db": "PACKETSTORM",
        "id": "48806"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200608-080"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-4015"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-08-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-20123"
      },
      {
        "date": "2006-08-02T00:00:00",
        "db": "BID",
        "id": "19310"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-001923"
      },
      {
        "date": "2006-08-10T00:40:54",
        "db": "PACKETSTORM",
        "id": "48806"
      },
      {
        "date": "2006-08-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200608-080"
      },
      {
        "date": "2006-08-07T19:04:00",
        "db": "NVD",
        "id": "CVE-2006-4015"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-20123"
      },
      {
        "date": "2006-08-03T15:51:00",
        "db": "BID",
        "id": "19310"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-001923"
      },
      {
        "date": "2007-05-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200608-080"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2006-4015"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200608-080"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "HP ProCurve Service disruption in switches  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-001923"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200608-080"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…