VAR-201304-0481

Vulnerability from variot - Updated: 2022-05-17 02:05

The D-LINK DIR-615/DIR-300 set/runtime/diagnostic/pingIp and exeshell parameters lack sufficient validation of the input, allowing authenticated remote attackers to exploit the vulnerability to execute arbitrary OS commands. The D-LINK DIR-615/DIR-300 incorrectly restricts access to the DevInfo.txt file, allowing remote attackers to exploit the vulnerability to submit requests directly to obtain device information, including model, hardware version, linux kernel information, firmware version, language and MAC. address. The D-LINK DIR-615/DIR-300 password storage is not hashed and stored in the /var/etc/httppasswd file in plain text, which can lead to the disclosure of sensitive information. The D-LINK DIR-615/DIR-300 change password does not require a current password, allowing an attacker to change the password without having to know the authentication credentials. D-Link DIR-600 and DIR-300 are wireless routers. The following security vulnerabilities exist in D-Link DIR-600 and DIR-300: 1. Multiple command injection vulnerabilities 2. Cross-site request forgery vulnerabilities 3. Cross-site scripting vulnerabilities 4. Encryption algorithm vulnerabilities 5. Multiple information leakage vulnerabilities 6. HTTP header injection vulnerability 7. Security bypass vulnerability. Attackers can use these vulnerabilities to gain access to potentially sensitive information, crack stored passwords, execute arbitrary commands in the context of the affected device, steal cookie-based authentication, perform unauthorized operations in the user's session context, or redirect users Visit any website and execute HTTP request privately, there may be other forms of attacks. Other attacks are also possible

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201304-0481",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "dir-300",
        "scope": "eq",
        "trust": 4.5,
        "vendor": "d link",
        "version": "1.05"
      },
      {
        "model": "dir-615",
        "scope": "eq",
        "trust": 4.2,
        "vendor": "d link",
        "version": "4.13"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04211"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04209"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04205"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04212"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04208"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04207"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04206"
      },
      {
        "db": "BID",
        "id": "59405"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Michael Messner",
    "sources": [
      {
        "db": "BID",
        "id": "59405"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-510"
      }
    ],
    "trust": 0.9
  },
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2013-04211",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2013-04209",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-04205",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-04212",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2013-04208",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "CNVD-2013-04207",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-04206",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "CNVD",
            "id": "CNVD-2013-04211",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-04209",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-04205",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-04212",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-04208",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-04207",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-04206",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04211"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04209"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04205"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04212"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04208"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04207"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04206"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The D-LINK DIR-615/DIR-300 set/runtime/diagnostic/pingIp and exeshell parameters lack sufficient validation of the input, allowing authenticated remote attackers to exploit the vulnerability to execute arbitrary OS commands. The D-LINK DIR-615/DIR-300 incorrectly restricts access to the DevInfo.txt file, allowing remote attackers to exploit the vulnerability to submit requests directly to obtain device information, including model, hardware version, linux kernel information, firmware version, language and MAC. address. The D-LINK DIR-615/DIR-300 password storage is not hashed and stored in the /var/etc/httppasswd file in plain text, which can lead to the disclosure of sensitive information. The D-LINK DIR-615/DIR-300 change password does not require a current password, allowing an attacker to change the password without having to know the authentication credentials. D-Link DIR-600 and DIR-300 are wireless routers. \nThe following security vulnerabilities exist in D-Link DIR-600 and DIR-300: 1. Multiple command injection vulnerabilities 2. Cross-site request forgery vulnerabilities 3. Cross-site scripting vulnerabilities 4. Encryption algorithm vulnerabilities 5. Multiple information leakage vulnerabilities 6. HTTP header injection vulnerability 7. Security bypass vulnerability. Attackers can use these vulnerabilities to gain access to potentially sensitive information, crack stored passwords, execute arbitrary commands in the context of the affected device, steal cookie-based authentication, perform unauthorized operations in the user\u0027s session context, or redirect users Visit any website and execute HTTP request privately, there may be other forms of attacks. Other attacks are also possible",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04211"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04209"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04205"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04212"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04208"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04207"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04206"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-510"
      },
      {
        "db": "BID",
        "id": "59405"
      }
    ],
    "trust": 4.59
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "59405",
        "trust": 5.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04211",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04209",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04205",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04212",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04208",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04207",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04206",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-510",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04211"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04209"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04205"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04212"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04208"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04207"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04206"
      },
      {
        "db": "BID",
        "id": "59405"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-510"
      }
    ]
  },
  "id": "VAR-201304-0481",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04211"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04209"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04205"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04212"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04208"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04207"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04206"
      }
    ],
    "trust": 4.89885237
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT",
          "Network device"
        ],
        "sub_category": null,
        "trust": 4.2
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04211"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04209"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04205"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04212"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04208"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04207"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04206"
      }
    ]
  },
  "last_update_date": "2022-05-17T02:05:56.995000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "D-LINK DIR-615/DIR-300 HTTP header injection vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/33635"
      },
      {
        "title": "Patch for D-LINK DIR-615/DIR-300 Reflective Cross-Site Scripting Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/33634"
      },
      {
        "title": "D-LINK DIR-615/DIR-300 OS Command Injection Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/33630"
      },
      {
        "title": "Patch for D-LINK DIR-615/DIR-300 Sensitive Information Disclosure Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/33636"
      },
      {
        "title": "D-LINK DIR-615/DIR-300 Patch for Unsecure Encryption Storage Vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/33633"
      },
      {
        "title": "Patch for D-LINK DIR-615/DIR-300 Cross-Site Request Forgery Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/33632"
      },
      {
        "title": "Patch for D-LINK DIR-615/DIR-300 Password Change Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/33631"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04211"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04209"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04205"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04212"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04208"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04207"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04206"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 4.2,
        "url": "http://seclists.org/bugtraq/2013/apr/148"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/59405"
      },
      {
        "trust": 0.3,
        "url": "http://www.dlink.com/products/?pid=565"
      },
      {
        "trust": 0.3,
        "url": "http://www.dlink.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04211"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04209"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04205"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04212"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04208"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04207"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04206"
      },
      {
        "db": "BID",
        "id": "59405"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-510"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04211"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04209"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04205"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04212"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04208"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04207"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04206"
      },
      {
        "db": "BID",
        "id": "59405"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-510"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04211"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04209"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04205"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04212"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04208"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04207"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04206"
      },
      {
        "date": "2013-04-22T00:00:00",
        "db": "BID",
        "id": "59405"
      },
      {
        "date": "2013-04-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201304-510"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04211"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04209"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04205"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04212"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04208"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04207"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04206"
      },
      {
        "date": "2013-08-08T05:15:00",
        "db": "BID",
        "id": "59405"
      },
      {
        "date": "2013-04-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201304-510"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-510"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "D-LINK DIR-615/DIR-300 HTTP Header Injection Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04211"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "59405"
      }
    ],
    "trust": 0.3
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…