CVE-2021-29143 (GCVE-0-2021-29143)
Vulnerability from cvelistv5
Published
2021-07-22 13:31
Modified
2024-08-03 22:02
Severity ?
CWE
  • remote execution of arbitrary commands
Summary
A remote execution of arbitrary commands vulnerability was discovered in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.
Impacted products
Vendor Product Version
n/a Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series Version: Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:02:50.516Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-013.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A remote execution of arbitrary commands vulnerability was discovered in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "remote execution of arbitrary commands",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-22T13:31:38",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-013.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2021-29143",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A remote execution of arbitrary commands vulnerability was discovered in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "remote execution of arbitrary commands"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-013.txt",
              "refsource": "MISC",
              "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-013.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2021-29143",
    "datePublished": "2021-07-22T13:31:38",
    "dateReserved": "2021-03-24T00:00:00",
    "dateUpdated": "2024-08-03T22:02:50.516Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-29143\",\"sourceIdentifier\":\"security-alert@hpe.com\",\"published\":\"2021-07-22T14:15:07.947\",\"lastModified\":\"2024-11-21T06:00:46.450\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A remote execution of arbitrary commands vulnerability was discovered in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado una vulnerabilidad de ejecuci\u00f3n remota de comandos arbitrarios en Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series, versiones de firmware: Aruba AOS-CX : versiones 10.04.xxxx - anteriores a 10.04.3070, versiones 10.05.xxxx - anteriores a 10.05.0070, versiones 10.06.xxxx - anteriores a 10.06.0110, versiones 10.07.xxxx - anteriores a 10.07.0001. Aruba ha publicado actualizaciones para los dispositivos Aruba AOS-CX, que solucionan esta vulnerabilidad de seguridad\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.04.000\",\"versionEndExcluding\":\"10.04.3070\",\"matchCriteriaId\":\"53B1F32A-5105-4EBE-B109-00614703FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.05.0000\",\"versionEndExcluding\":\"10.05.0070\",\"matchCriteriaId\":\"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0000\",\"versionEndIncluding\":\"10.06.0110\",\"matchCriteriaId\":\"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0000\",\"versionEndIncluding\":\"10.07.0001\",\"matchCriteriaId\":\"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:cx_6200f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CB3993F-B4A6-4016-AF0F-82A23FE34063\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.04.000\",\"versionEndExcluding\":\"10.04.3070\",\"matchCriteriaId\":\"53B1F32A-5105-4EBE-B109-00614703FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.05.0000\",\"versionEndExcluding\":\"10.05.0070\",\"matchCriteriaId\":\"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0000\",\"versionEndIncluding\":\"10.06.0110\",\"matchCriteriaId\":\"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0000\",\"versionEndIncluding\":\"10.07.0001\",\"matchCriteriaId\":\"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:cx_6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C32F7E4-E184-4F76-8638-017DF29D2FFB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.04.000\",\"versionEndExcluding\":\"10.04.3070\",\"matchCriteriaId\":\"53B1F32A-5105-4EBE-B109-00614703FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.05.0000\",\"versionEndExcluding\":\"10.05.0070\",\"matchCriteriaId\":\"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0000\",\"versionEndIncluding\":\"10.06.0110\",\"matchCriteriaId\":\"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0000\",\"versionEndIncluding\":\"10.07.0001\",\"matchCriteriaId\":\"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:cx_6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A013EAE-387B-4C35-9D8F-E2200081E18E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.04.000\",\"versionEndExcluding\":\"10.04.3070\",\"matchCriteriaId\":\"53B1F32A-5105-4EBE-B109-00614703FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.05.0000\",\"versionEndExcluding\":\"10.05.0070\",\"matchCriteriaId\":\"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0000\",\"versionEndIncluding\":\"10.06.0110\",\"matchCriteriaId\":\"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0000\",\"versionEndIncluding\":\"10.07.0001\",\"matchCriteriaId\":\"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:cx_8320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C93CD9C-1FD4-4E4A-9E3A-8FF19DE0D3AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.04.000\",\"versionEndExcluding\":\"10.04.3070\",\"matchCriteriaId\":\"53B1F32A-5105-4EBE-B109-00614703FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.05.0000\",\"versionEndExcluding\":\"10.05.0070\",\"matchCriteriaId\":\"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0000\",\"versionEndIncluding\":\"10.06.0110\",\"matchCriteriaId\":\"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0000\",\"versionEndIncluding\":\"10.07.0001\",\"matchCriteriaId\":\"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:cx_8325:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9645D616-077B-4313-B5EF-155B642CB073\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.04.000\",\"versionEndExcluding\":\"10.04.3070\",\"matchCriteriaId\":\"53B1F32A-5105-4EBE-B109-00614703FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.05.0000\",\"versionEndExcluding\":\"10.05.0070\",\"matchCriteriaId\":\"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0000\",\"versionEndIncluding\":\"10.06.0110\",\"matchCriteriaId\":\"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0000\",\"versionEndIncluding\":\"10.07.0001\",\"matchCriteriaId\":\"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:cx_8360:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9440291-26BB-4BBD-84BA-B347484839F4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.04.000\",\"versionEndExcluding\":\"10.04.3070\",\"matchCriteriaId\":\"53B1F32A-5105-4EBE-B109-00614703FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.05.0000\",\"versionEndExcluding\":\"10.05.0070\",\"matchCriteriaId\":\"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0000\",\"versionEndIncluding\":\"10.06.0110\",\"matchCriteriaId\":\"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0000\",\"versionEndIncluding\":\"10.07.0001\",\"matchCriteriaId\":\"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:cx_8400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4FB7A6B-69C5-45EF-BE61-23BCF5172836\"}]}]}],\"references\":[{\"url\":\"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-013.txt\",\"source\":\"security-alert@hpe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-013.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…