var-201606-0175
Vulnerability from variot
BUFFALO WZR-600DHP3 devices with firmware 2.16 and earlier and WZR-S600DHP devices allow remote attackers to discover credentials and other sensitive information via unspecified vectors. Multiple Buffalo wireless LAN routers contain an information disclosure vulnerability. Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Information such as authentication credentials may be disclosed by an unauthenticated remote attacker. The Buffalo WZR-600DHP3 and WZR-S600DHP are both wireless router products of the Buffalo Group in Japan. A remote attacker can exploit this vulnerability to obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201606-0175", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wzr-600dhp3", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "2.16" }, { "model": "wzr-1750dhp", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "2.28" }, { "model": "wxr-1750dhp", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "2.42" }, { "model": "dwr-hp-g300nh", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.81" }, { "model": "wzr-450hp-cwt", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.92" }, { "model": "wzr-1166dhp2", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "2.13" }, { "model": "hw-450hp-zwe", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.91" }, { "model": "wzr-900dhp2", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "2.16" }, { "model": "wcr-300", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.86" }, { "model": "wpl-05g300", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.86" }, { "model": "whr-300hp", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.96" }, { "model": "wxr-1900dhp", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "2.34" }, { "model": "wzr-hp-ag300h", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.73" }, { "model": "wzr-1750dhp2", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "2.28" }, { "model": "wzr-450hp", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.97" }, { "model": "wapm-apg300n", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "2.62" }, { "model": "wzr-hp-g300nh", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.81" }, { "model": "wzr-s600dhp", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "2.16" }, { "model": "fs-600dhp", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "3.34" }, { "model": "whr-300", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.96" }, { "model": "wzr-hp-g450h", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.87" }, { "model": "wzr-600dhp", "scope": "eq", "trust": 1.0, "vendor": "buffalo", "version": "1.97" }, { "model": "bhr-4grv", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.96" }, { "model": "whr-hp-g300n", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.96" }, { "model": "wzr-s900dhp", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "2.16" }, { "model": "wzr-900dhp", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.11" }, { "model": "wzr-1166dhp", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "2.13" }, { "model": "wapm-ag300n", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "2.62" }, { "model": "wzr-450hp-ub", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.96" }, { "model": "wzr-300hp", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.96" }, { "model": "wzr-hp-g301nh", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.81" }, { "model": "wzr-900dhp2", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.13" }, { "model": "wzr-hp-g302h", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.83" }, { "model": "wzr-s1750dhp", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "2.28" }, { "model": "wzr-d1100h", "scope": "lte", "trust": 1.0, "vendor": "buffalo", "version": "1.96" }, { "model": "wzr-600dhp3", "scope": "lte", "trust": 0.8, "vendor": "buffalo", "version": "ver.2.16" }, { "model": "wzr-s600dhp", "scope": "lte", "trust": 0.8, "vendor": "buffalo", "version": "ver.2.16" }, { "model": "wzr-600dhp3 \u003c=ver.2.16", "scope": null, "trust": 0.6, "vendor": "buffalo", "version": null }, { "model": "wzr-s600dhp \u003c=ver.2.16", "scope": null, "trust": 0.6, "vendor": "buffalo", "version": null }, { "model": "wzr-600dhp", "scope": "eq", "trust": 0.6, "vendor": "buffalo", "version": null }, { "model": "wzr-450hp", "scope": "eq", "trust": 0.6, "vendor": "buffalo", "version": null }, { "model": "wzr-hp-g301nh", "scope": "eq", "trust": 0.6, "vendor": "buffalo", "version": null }, { "model": "wzr-600dhp3", "scope": "eq", "trust": 0.6, "vendor": "buffalo", "version": null }, { "model": "wxr-1750dhp", "scope": "eq", "trust": 0.6, "vendor": "buffalo", "version": null }, { "model": "wzr-450hp-cwt", "scope": "eq", "trust": 0.6, "vendor": "buffalo", "version": null }, { "model": "hw-450hp-zwe", "scope": "eq", "trust": 0.6, "vendor": "buffalo", "version": null }, { "model": "wzr-900dhp2", "scope": "eq", "trust": 0.6, "vendor": "buffalo", "version": null }, { "model": "wcr-300", "scope": "eq", "trust": 0.6, "vendor": "buffalo", "version": null }, { "model": "wzr-hp-g450h", "scope": "eq", "trust": 0.6, "vendor": "buffalo", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03694" }, { "db": "JVNDB", "id": "JVNDB-2016-000087" }, { "db": "CNNVD", "id": "CNNVD-201605-674" }, { "db": "NVD", "id": "CVE-2016-4816" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:buffalo_inc:wzr-600dhp3_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:buffalo_inc:wzr-s600dhp_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-000087" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc.", "sources": [ { "db": "BID", "id": "90905" }, { "db": "CNNVD", "id": "CNNVD-201605-674" } ], "trust": 0.9 }, "cve": "CVE-2016-4816", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2016-4816", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2016-000087", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2016-03694", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-93635", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2016-4816", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2016-000087", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-4816", "trust": 1.0, "value": "MEDIUM" }, { "author": "IPA", "id": "JVNDB-2016-000087", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2016-03694", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201605-674", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-93635", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03694" }, { "db": "VULHUB", "id": "VHN-93635" }, { "db": "JVNDB", "id": "JVNDB-2016-000087" }, { "db": "CNNVD", "id": "CNNVD-201605-674" }, { "db": "NVD", "id": "CVE-2016-4816" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "BUFFALO WZR-600DHP3 devices with firmware 2.16 and earlier and WZR-S600DHP devices allow remote attackers to discover credentials and other sensitive information via unspecified vectors. Multiple Buffalo wireless LAN routers contain an information disclosure vulnerability. Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Information such as authentication credentials may be disclosed by an unauthenticated remote attacker. The Buffalo WZR-600DHP3 and WZR-S600DHP are both wireless router products of the Buffalo Group in Japan. A remote attacker can exploit this vulnerability to obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2016-4816" }, { "db": "JVNDB", "id": "JVNDB-2016-000087" }, { "db": "CNVD", "id": "CNVD-2016-03694" }, { "db": "BID", "id": "90905" }, { "db": "VULHUB", "id": "VHN-93635" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-4816", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2016-000087", "trust": 3.1 }, { "db": "JVN", "id": "JVN75813272", "trust": 3.1 }, { "db": "CNNVD", "id": "CNNVD-201605-674", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-03694", "trust": 0.6 }, { "db": "BID", "id": "90905", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-93635", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03694" }, { "db": "VULHUB", "id": "VHN-93635" }, { "db": "BID", "id": "90905" }, { "db": "JVNDB", "id": "JVNDB-2016-000087" }, { "db": "CNNVD", "id": "CNNVD-201605-674" }, { "db": "NVD", "id": "CVE-2016-4816" } ] }, "id": "VAR-201606-0175", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-03694" }, { "db": "VULHUB", "id": "VHN-93635" } ], "trust": 1.0713480954545453 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03694" } ] }, "last_update_date": "2024-08-14T14:46:23.024000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "BUFFALO INC. website", "trust": 0.8, "url": "http://buffalo.jp/support_s/s20160527a.html" }, { "title": "Patch for BuffaloWZR-600DHP3 and WZR-S600DHP Information Disclosure Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/76685" }, { "title": "Buffalo WZR-600DHP3 and WZR-S600DHP Repair measures for information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61984" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03694" }, { "db": "JVNDB", "id": "JVNDB-2016-000087" }, { "db": "CNNVD", "id": "CNNVD-201605-674" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-93635" }, { "db": "JVNDB", "id": "JVNDB-2016-000087" }, { "db": "NVD", "id": "CVE-2016-4816" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://jvn.jp/en/jp/jvn75813272/index.html" }, { "trust": 2.3, "url": "http://jvndb.jvn.jp/jvndb/jvndb-2016-000087" }, { "trust": 1.7, "url": "http://buffalo.jp/support_s/s20160527a.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4816" }, { "trust": 0.8, "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4816" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03694" }, { "db": "VULHUB", "id": "VHN-93635" }, { "db": "JVNDB", "id": "JVNDB-2016-000087" }, { "db": "CNNVD", "id": "CNNVD-201605-674" }, { "db": "NVD", "id": "CVE-2016-4816" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-03694" }, { "db": "VULHUB", "id": "VHN-93635" }, { "db": "BID", "id": "90905" }, { "db": "JVNDB", "id": "JVNDB-2016-000087" }, { "db": "CNNVD", "id": "CNNVD-201605-674" }, { "db": "NVD", "id": "CVE-2016-4816" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-03694" }, { "date": "2016-06-19T00:00:00", "db": "VULHUB", "id": "VHN-93635" }, { "date": "2016-05-27T00:00:00", "db": "BID", "id": "90905" }, { "date": "2016-05-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-000087" }, { "date": "2016-05-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-674" }, { "date": "2016-06-19T01:59:11.043000", "db": "NVD", "id": "CVE-2016-4816" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-03694" }, { "date": "2016-06-21T00:00:00", "db": "VULHUB", "id": "VHN-93635" }, { "date": "2016-05-27T00:00:00", "db": "BID", "id": "90905" }, { "date": "2016-06-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-000087" }, { "date": "2016-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-674" }, { "date": "2016-06-21T13:09:59.877000", "db": "NVD", "id": "CVE-2016-4816" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-674" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Buffalo wireless LAN routers vulnerable to information disclosure", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-000087" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-674" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.