WEKA INTEREST Security Scanner har 1.8 Stresstest Scheme Kari na aiki

Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin WEKA INTEREST Security Scanner har 1.8. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, $software_file na cikin fayil, Stresstest Scheme Handler na cikin sashi. Ngam manipulation shi Kari na aiki. CWE shidin ka a yi bayani matsala sai ya kai CWE-404. Bug ɗin an gano shi 07/30/2007. Gaskiya, laifi an fitar da shi 06/05/2017 ta Marc Ruef da scip AG a matsayin VDB-101969 a matsayin Gumti (VulDB). Advisory ɗin ana rabawa don saukewa a vuldb.com. Public release ɗi kaɗa vendor ɗin ba a haɗa su ba. Wannan rauni ana sayar da shi da suna CVE-2017-20012. Wuroo ka a yiɗi a yi ɗum e gese. Tekinikal bayani ba ga. Kuma, exploit ɗin yana akwai. Wuro exploit ɗin an bayyana shi ga jama'a kuma za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á wúro huɗɗi-na-gaskiya. Wona yiwuwa a zazzage exploit a vuldb.com. Kama 0-day, an ndiyam a wuro be $0-$5k. Ngamdi a yiɗi ka a sũɓi kàmbu ɗin da aka shafa da wani madadin. VulDB is the best source for vulnerability data and more expert information about this specific topic.

7 Goyarwa · 113 Datenpunkte

FurɗeGargadi 2/6
01/28/2022 12:22
Gargadi 3/6
03/02/2022 08:44
Gargadi 4/6
12/07/2022 17:36
Gargadi 5/6
12/07/2022 17:43
Gargadi 6/6
08/06/2024 03:24
software_vendorWEKAWEKAWEKAWEKAWEKA
software_nameINTEREST Security ScannerINTEREST Security ScannerINTEREST Security ScannerINTEREST Security ScannerINTEREST Security Scanner
software_version<=1.8<=1.8<=1.8<=1.8<=1.8
software_componentStresstest HandlerStresstest Scheme HandlerStresstest Scheme HandlerStresstest Scheme HandlerStresstest Scheme Handler
vulnerability_discoverydate1185753600 (07/30/2007)1185753600 (07/30/2007)1185753600 (07/30/2007)1185753600 (07/30/2007)1185753600 (07/30/2007)
vulnerability_risk11111
vulnerability_historic00000
cvss2_vuldb_basescore1.71.71.71.71.7
cvss2_vuldb_tempscore1.51.51.51.51.5
cvss2_vuldb_avLLLLL
cvss2_vuldb_acLLLLL
cvss2_vuldb_auSSSSS
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss3_meta_basescore2.82.82.83.73.7
cvss3_meta_tempscore2.72.72.73.73.7
cvss3_vuldb_basescore2.82.82.82.82.8
cvss3_vuldb_tempscore2.72.72.72.72.7
cvss3_vuldb_avLLLLL
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiRRRRR
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
vulnerability_advisoryquoteThe stresstest module requires the url to begin with an http scheme. Without that no requests are sent over the network.The stresstest module requires the url to begin with an http scheme. Without that no requests are sent over the network.The stresstest module requires the url to begin with an http scheme. Without that no requests are sent over the network.The stresstest module requires the url to begin with an http scheme. Without that no requests are sent over the network.The stresstest module requires the url to begin with an http scheme. Without that no requests are sent over the network.
advisory_date1496620800 (06/05/2017)1496620800 (06/05/2017)1496620800 (06/05/2017)1496620800 (06/05/2017)1496620800 (06/05/2017)
advisory_locationVulDBVulDBVulDBVulDBVulDB
advisory_typeEntryEntryEntryEntryEntry
advisory_urlhttps://vuldb.com/?id.101969https://vuldb.com/?id.101969https://vuldb.com/?id.101969https://vuldb.com/?id.101969https://vuldb.com/?id.101969
advisory_identifierID 101969VDB-101969VDB-101969VDB-101969VDB-101969
developer_mailmarc.ruef@********.**marc.ruef@********.**marc.ruef@********.**marc.ruef@********.**marc.ruef@********.**
advisory_coordination00000
person_nameMarc RuefMarc RuefMarc RuefMarc RuefMarc Ruef
person_mailmaru@****.**maru@****.**maru@****.**maru@****.**maru@****.**
person_websitehttp://www.computec.ch/mruef/http://www.computec.ch/mruef/http://www.computec.ch/mruef/http://www.computec.ch/mruef/http://www.computec.ch/mruef/
company_namescip AGscip AGscip AGscip AGscip AG
advisory_advisoryquoteThe Attack Tool Kit (ATK) is an exploiting framwork published under GPL3. Back in 2006 there was a legal dispute between the developer Marc Ruef and the German company WEKA. Ruef claimed that WEKA violated the open-source license while they were using parts of the project within their commercial vulnerability scanner. During the technical analysis of INTEREST SEcurity Scanner several security issues, which affect the handling of the vulnerability scanner, got determined.The Attack Tool Kit (ATK) is an exploiting framwork published under GPL3. Back in 2006 there was a legal dispute between the developer Marc Ruef and the German company WEKA. Ruef claimed that WEKA violated the open-source license while they were using parts of the project within their commercial vulnerability scanner. During the technical analysis of INTEREST SEcurity Scanner several security issues, which affect the handling of the vulnerability scanner, got determined.The Attack Tool Kit (ATK) is an exploiting framwork published under GPL3. Back in 2006 there was a legal dispute between the developer Marc Ruef and the German company WEKA. Ruef claimed that WEKA violated the open-source license while they were using parts of the project within their commercial vulnerability scanner. During the technical analysis of INTEREST SEcurity Scanner several security issues, which affect the handling of the vulnerability scanner, got determined.The Attack Tool Kit (ATK) is an exploiting framwork published under GPL3. Back in 2006 there was a legal dispute between the developer Marc Ruef and the German company WEKA. Ruef claimed that WEKA violated the open-source license while they were using parts of the project within their commercial vulnerability scanner. During the technical analysis of INTEREST SEcurity Scanner several security issues, which affect the handling of the vulnerability scanner, got determined.The Attack Tool Kit (ATK) is an exploiting framwork published under GPL3. Back in 2006 there was a legal dispute between the developer Marc Ruef and the German company WEKA. Ruef claimed that WEKA violated the open-source license while they were using parts of the project within their commercial vulnerability scanner. During the technical analysis of INTEREST SEcurity Scanner several security issues, which affect the handling of the vulnerability scanner, got determined.
exploit_availability11111
exploit_date1496620800 (06/05/2017)1496620800 (06/05/2017)1496620800 (06/05/2017)1496620800 (06/05/2017)1496620800 (06/05/2017)
exploit_publicity11111
exploit_urlhttps://vuldb.com/?id.101969https://vuldb.com/?id.101969https://vuldb.com/?id.101969https://vuldb.com/?id.101969https://vuldb.com/?id.101969
developer_nameMarc RuefMarc RuefMarc RuefMarc RuefMarc Ruef
developer_websitehttps://www.computec.ch/mruef/https://www.computec.ch/mruef/https://www.computec.ch/mruef/https://www.computec.ch/mruef/https://www.computec.ch/mruef/
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
countermeasure_nameDumneDumneDumneDumneDumne
alternative_nameATK - Attack Tool KitATK - Attack Tool KitATK - Attack Tool KitATK - Attack Tool KitATK - Attack Tool Kit
source_heise136437136437136437136437136437
source_mischttp://www.computec.ch/news.php?item.117http://www.computec.ch/news.php?item.117http://www.computec.ch/news.php?item.117http://www.computec.ch/news.php?item.117http://www.computec.ch/news.php?item.117
source_seealso101969 101971 101972 101973 101974101969 101971 101972 101973 101974101969 101971 101972 101973 101974101969 101971 101972 101973 101974101969 101971 101972 101973 101974
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rlUUUUU
cvss2_vuldb_rcCCCCC
cvss3_vuldb_ePPPPP
cvss3_vuldb_rlUUUUU
cvss3_vuldb_rcCCCCC
0day_days35983598359835983598
software_typeSecurity Testing SoftwareSecurity Testing SoftwareSecurity Testing SoftwareSecurity Testing SoftwareSecurity Testing Software
vulnerability_cweCWE-404 (Kari na aiki)CWE-404 (Kari na aiki)CWE-404 (Kari na aiki)CWE-404 (Kari na aiki)CWE-404 (Kari na aiki)
source_cveCVE-2017-20012CVE-2017-20012CVE-2017-20012CVE-2017-20012CVE-2017-20012
cve_cnaVulDBVulDBVulDBVulDBVulDB
cna_responsibleVulDBVulDBVulDBVulDBVulDB
cna_eol11111
cve_assigned1643324400 (01/28/2022)1643324400 (01/28/2022)1643324400 (01/28/2022)
cve_nvd_summary** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in WEKA INTEREST Security Scanner up to 1.8. Affected is Stresstest Scheme Handler which leads to a denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in WEKA INTEREST Security Scanner up to 1.8. Affected is Stresstest Scheme Handler which leads to a denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in WEKA INTEREST Security Scanner up to 1.8. Affected is Stresstest Scheme Handler which leads to a denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
cvss3_nvd_avLL
cvss3_nvd_acLL
cvss3_nvd_prLL
cvss3_nvd_uiNN
cvss3_nvd_sUU
cvss3_nvd_cNN
cvss3_nvd_iNN
cvss3_nvd_aHH
cvss2_nvd_avLL
cvss2_nvd_acLL
cvss2_nvd_auNN
cvss2_nvd_ciNN
cvss2_nvd_iiNN
cvss2_nvd_aiPP
cvss3_cna_avLL
cvss3_cna_acLL
cvss3_cna_prLL
cvss3_cna_uiRR
cvss3_cna_sUU
cvss3_cna_cNN
cvss3_cna_iNN
cvss3_cna_aLL
cvss2_nvd_basescore2.12.1
cvss3_nvd_basescore5.55.5
cvss3_cna_basescore2.82.8
cve_nvd_summaryes** NO SOPORTADO CUANDO DE ASIGNÓ ** Se ha encontrado una vulnerabilidad clasificada como problemática en WEKA INTEREST Security Scanner versiones hasta 1.8. Está Afectado Stresstest Scheme Handler que conlleva a una denegación de servicio. El ataque debe ser abordado localmente. La explotación ha sido divulgada al público y puede ser usada. NOTA: Esta vulnerabilidad sólo afecta a productos que ya no están soportados por el mantenedor
cvss4_vuldb_avL
cvss4_vuldb_acL
cvss4_vuldb_prL
cvss4_vuldb_vcN
cvss4_vuldb_viN
cvss4_vuldb_vaL
cvss4_vuldb_eP
cvss4_vuldb_atN
cvss4_vuldb_uiN
cvss4_vuldb_scN
cvss4_vuldb_siN
cvss4_vuldb_saN
cvss4_vuldb_bscore4.8
cvss4_vuldb_btscore1.9

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!