[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"vulnerability-19974":4,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":32,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":39,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":45},[],{"id":5,"detectable_with":6,"vuln_details":13,"vuln_id":29,"name":30,"published":31,"updated":14},19974,{"tool":7,"engine":10},{"id":8,"name":9},1,"Network Scanner",{"id":11,"name":12},3,"OpenVAS",{"id":5,"codename":14,"description":14,"severity":15,"risk_description":16,"public_description":17,"public_recommendation":18,"recommendation":14,"references":19,"cvssv3":22,"epss_score":23,"epss_percentile":24,"cve":25,"in_cisa_catalog":27,"date":28,"software_type":14,"vendor":14,"product":14,"ptt_exploit_capabilities":14},null,"high","The web server used by MikroTik RouterOS is affected by a heap memory corruption issue. A remote and unauthenticated attacker can corrupt the servers heap memory by sending a crafted HTTP request. As a result, the web interface crashes and is immediately restarted.","MikroTik RouterOS is prone to a denial of service (DoS) vulnerability.","Update to version 6.48.8, 6.49.10 or later.",[20,21],"https://vulncheck.com/advisories/mikrotik-jsproxy-dos","https://gist.github.com/j-baines/fdd1e85482838c6299900c1e859071c2",7.5,0.10372,0.9319,[26],"CVE-2023-30800",false,"2023-09-07T00:00:00Z","NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.150998","MikroTik RouterOS 6.0.0 \u003C 6.48.8, 6.49.x \u003C 6.49.10 DoS Vulnerability","2023-09-18T00:00:00Z",["Island",33],{"key":34,"params":35,"result":37},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":36},"{}",{"head":38},{},["Island",40],{"key":41,"params":42,"result":43},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":36},{"head":44},{},["Island",46],{"key":47,"params":48,"result":50},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":49},"{\"text-color\":\"gray\"}",{"head":51},{}]