SevOne Network Management System ଯେପର୍ଯ୍ୟନ୍ତ 5.7.2.22 Traceroute traceroute.php ବିସ୍ତାରିତ ଅଧିକାର

Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu SevOne Network Management System ଯେପର୍ଯ୍ୟନ୍ତ 5.7.2.22 keessatti argameera. Kan miidhamte is hojii hin beekamne faayilii traceroute.php keessa kutaa Traceroute Handler keessa. Hojii jijjiirraa gara ବିସ୍ତାରିତ ଅଧିକାର geessa. CWE fayyadamuun rakkoo ibsuun gara CWE-77 geessa. Dadhabbii kana yeroo 10/02/2020 maxxanfameera kan maxxansiise Calvin Phang waliin SEC Consult Vulnerability Lab akka SEC Consult SA-20201002-0 akka Mailinglist Post. Odeeffannoon kun buufachuuf seclists.org irratti qoodameera. Beeksisni uummataaf gad-lakkifamuu gurgurtaa waliin qindaa'ee jira. Dogoggorri kun akka CVE-2020-36529tti beekama. Yaaliin weeraraa fageenya irraa jalqabamuu ni danda'a. Faayidaaleen teeknikaa ni jiru. Waliigalatti, meeshaa balaa kana fayyadamuuf jiru. Amma, gatii ammee exploit might be approx. USD $0-$5k ta'uu danda'a. Akka ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee ibsameera. Hanqinni kun guyyoota 59 caalaa akka zero-day kan ummataaf hin ifneetti fayyadamee ture. Akka 0-daytti, gatii daldalaa dhoksaa tilmaamame $0-$5k ta'ee ture. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

3 ଆଡାପ୍ଟେସନ୍ · 51 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
10/04/2020 11:51 AM
ଅଦ୍ୟତନ 1/2
10/04/2020 01:56 PM
ଅଦ୍ୟତନ 2/2
06/03/2022 08:32 PM
software_vendorSevOneSevOneSevOne
software_nameNetwork Management SystemNetwork Management SystemNetwork Management System
software_version<=5.7.2.22<=5.7.2.22<=5.7.2.22
software_componentTraceroute HandlerTraceroute HandlerTraceroute Handler
software_filetraceroute.phptraceroute.phptraceroute.php
vulnerability_cweCWE-77 (ବିସ୍ତାରିତ ଅଧିକାର)CWE-77 (ବିସ୍ତାରିତ ଅଧିକାର)CWE-77 (ବିସ୍ତାରିତ ଅଧିକାର)
vulnerability_risk222
vulnerability_vendorinformdate1596492000 (08/04/2020)1596492000 (08/04/2020)1596492000 (08/04/2020)
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_cHHH
cvss3_vuldb_iHHH
cvss3_vuldb_aHHH
cvss3_vuldb_eXXX
cvss3_vuldb_rlUUU
cvss3_vuldb_rcXXX
cvss2_vuldb_avNNN
cvss2_vuldb_acMMM
cvss2_vuldb_ciCCC
cvss2_vuldb_iiCCC
cvss2_vuldb_aiCCC
cvss2_vuldb_eNDNDND
cvss2_vuldb_rlUUU
cvss2_vuldb_rcNDNDND
advisory_date1601589600 (10/02/2020)1601589600 (10/02/2020)1601589600 (10/02/2020)
advisory_identifierSEC Consult SA-20201002-0SEC Consult SA-20201002-0SEC Consult SA-20201002-0
advisory_urlhttp://seclists.org/fulldisclosure/2020/Oct/5http://seclists.org/fulldisclosure/2020/Oct/5http://seclists.org/fulldisclosure/2020/Oct/5
advisory_typeMailinglist PostMailinglist PostMailinglist Post
advisory_coordination111
person_nameCalvin PhangCalvin PhangCalvin Phang
company_nameSEC Consult Vulnerability LabSEC Consult Vulnerability LabSEC Consult Vulnerability Lab
company_websitehttps://www.sec-consult.comhttps://www.sec-consult.comhttps://www.sec-consult.com
exploit_availability111
exploit_publicity000
developer_nameCalvin PhangCalvin PhangCalvin Phang
company_nameSEC Consult Vulnerability LabSEC Consult Vulnerability LabSEC Consult Vulnerability Lab
company_websitehttps://www.sec-consult.comhttps://www.sec-consult.comhttps://www.sec-consult.com
exploit_wormified000
cvss3_vuldb_basescore8.88.8
cvss3_vuldb_tempscore8.88.8
cvss3_meta_basescore8.88.8
cvss3_meta_tempscore8.88.8
price_0day$0-$5k$0-$5k
cvss2_vuldb_auSS
cvss3_vuldb_prLL
cvss3_vuldb_sUU
cvss2_vuldb_basescore8.58.5
cvss2_vuldb_tempscore8.58.5
source_cveCVE-2020-36529
cna_responsibleVulDB

Do you want to use VulDB in your project?

Use the official API to access entries easily!