CERTFR-2018-AVI-339
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Juniper . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Juniper Networks N/A Contrail Service Orchestration (CSO) versions antérieures à 4.0.0 et 3.3.0
Juniper Networks Junos Space Junos Space versions antérieures à 18.1R1
Juniper Networks Junos OS Junos OS versions antérieures à 12.1X46-D45, 12.1X46-D67, 12.1X46-D76, 12.1X46-D77, 12.3R11, 12.3R12-S10, 12.3X48-D20, 12.3X48-D25, 12.3X48-D55, 12.3X48-D66, 12.3X48-D70, 12.3X54-D34, 14.1X53-D30, 14.1X53-D47, 15.1F5-S5, 15.1F6-S1, 15.1F6-S10, 15.1F7, 15.1R4-S5, 15.1R4-S9, 15.1R5, 15.1R6-S6, 15.1R7, 15.1R7-S1, 15.1R8, 15.1X49-D110, 15.1X49-D131, 15.1X49-D140, 15.1X49-D20, 15.1X49-D35, 15.1X53-D233, 15.1X53-D234, 15.1X53-D47, 15.1X53-D470, 15.1X53-D471, 15.1X53-D490, 15.1X53-D59, 15.1X53-D60, 15.1X53-D67, 15.1X54-D70, 15.1X8.3, 16.1R2, 16.1R3, 16.1R3-S8, 16.1R3-S9, 16.1R4-S10, 16.1R4-S8, 16.1R4-S9, 16.1R5-S4, 16.1R6-S1, 16.1R6-S3, 16.1R6-S4, 16.1R7, 16.1X65-D46, 16.1X65-D47, 16.2R1, 16.2R1-S6, 16.2R1-S7, 16.2R2-S5, 16.2R2-S6, 16.2R3, 17.1R1-S7, 17.1R2-S7, 17.1R3, 17.2R1-S4, 17.2R1-S6, 17.2R2-S4, 17.2R2-S5, 17.2R3, 17.2X75-D100, 17.2X75-D110, 17.2X75-D70, 17.2X75-D90, 17.2X75-D91, 17.3R1, 17.3R1-S4, 17.3R2, 17.3R2-S2, 17.3R3, 17.4R1-S2, 17.4R1-S3, 17.4R1-S4, 17.4R2, 18.1R1, 18.1R2, 18.1X75-D10, 18.2R1, 18.2X75-D10 et 18.2X75-D5

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 4.0.0 et 3.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space versions ant\u00e9rieures \u00e0 18.1R1",
      "product": {
        "name": "Junos Space",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D45, 12.1X46-D67, 12.1X46-D76, 12.1X46-D77, 12.3R11, 12.3R12-S10, 12.3X48-D20, 12.3X48-D25, 12.3X48-D55, 12.3X48-D66, 12.3X48-D70, 12.3X54-D34, 14.1X53-D30, 14.1X53-D47, 15.1F5-S5, 15.1F6-S1, 15.1F6-S10, 15.1F7, 15.1R4-S5, 15.1R4-S9, 15.1R5, 15.1R6-S6, 15.1R7, 15.1R7-S1, 15.1R8, 15.1X49-D110, 15.1X49-D131, 15.1X49-D140, 15.1X49-D20, 15.1X49-D35, 15.1X53-D233, 15.1X53-D234, 15.1X53-D47, 15.1X53-D470, 15.1X53-D471, 15.1X53-D490, 15.1X53-D59, 15.1X53-D60, 15.1X53-D67, 15.1X54-D70, 15.1X8.3, 16.1R2, 16.1R3, 16.1R3-S8, 16.1R3-S9, 16.1R4-S10, 16.1R4-S8, 16.1R4-S9, 16.1R5-S4, 16.1R6-S1, 16.1R6-S3, 16.1R6-S4, 16.1R7, 16.1X65-D46, 16.1X65-D47, 16.2R1, 16.2R1-S6, 16.2R1-S7, 16.2R2-S5, 16.2R2-S6, 16.2R3, 17.1R1-S7, 17.1R2-S7, 17.1R3, 17.2R1-S4, 17.2R1-S6, 17.2R2-S4, 17.2R2-S5, 17.2R3, 17.2X75-D100, 17.2X75-D110, 17.2X75-D70, 17.2X75-D90, 17.2X75-D91, 17.3R1, 17.3R1-S4, 17.3R2, 17.3R2-S2, 17.3R3, 17.4R1-S2, 17.4R1-S3, 17.4R1-S4, 17.4R2, 18.1R1, 18.1R2, 18.1X75-D10, 18.2R1, 18.2X75-D10 et 18.2X75-D5",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2017-7407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7407"
    },
    {
      "name": "CVE-2018-0027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0027"
    },
    {
      "name": "CVE-2016-8615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8615"
    },
    {
      "name": "CVE-2015-3153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-3153"
    },
    {
      "name": "CVE-2018-0024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0024"
    },
    {
      "name": "CVE-2017-1000257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000257"
    },
    {
      "name": "CVE-2016-8619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8619"
    },
    {
      "name": "CVE-2013-1944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-1944"
    },
    {
      "name": "CVE-2018-2603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-2603"
    },
    {
      "name": "CVE-2017-8818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-8818"
    },
    {
      "name": "CVE-2018-0031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0031"
    },
    {
      "name": "CVE-2018-0035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0035"
    },
    {
      "name": "CVE-2018-1000115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000115"
    },
    {
      "name": "CVE-2016-9952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-9952"
    },
    {
      "name": "CVE-2017-10295",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-10295"
    },
    {
      "name": "CVE-2013-4545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-4545"
    },
    {
      "name": "CVE-2015-7236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7236"
    },
    {
      "name": "CVE-2017-3737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
    },
    {
      "name": "CVE-2016-4802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4802"
    },
    {
      "name": "CVE-2017-10388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-10388"
    },
    {
      "name": "CVE-2016-9953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-9953"
    },
    {
      "name": "CVE-2016-8624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8624"
    },
    {
      "name": "CVE-2018-0039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0039"
    },
    {
      "name": "CVE-2016-8616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8616"
    },
    {
      "name": "CVE-2015-3148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-3148"
    },
    {
      "name": "CVE-2016-8620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8620"
    },
    {
      "name": "CVE-2014-3613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-3613"
    },
    {
      "name": "CVE-2018-1000121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
    },
    {
      "name": "CVE-2013-6422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-6422"
    },
    {
      "name": "CVE-2018-0042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0042"
    },
    {
      "name": "CVE-2018-2618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-2618"
    },
    {
      "name": "CVE-2018-1000005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000005"
    },
    {
      "name": "CVE-2016-8617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8617"
    },
    {
      "name": "CVE-2016-0754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0754"
    },
    {
      "name": "CVE-2017-1000101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000101"
    },
    {
      "name": "CVE-2018-1000120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
    },
    {
      "name": "CVE-2014-8150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-8150"
    },
    {
      "name": "CVE-2014-3707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-3707"
    },
    {
      "name": "CVE-2016-8618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8618"
    },
    {
      "name": "CVE-2018-0037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0037"
    },
    {
      "name": "CVE-2015-3143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-3143"
    },
    {
      "name": "CVE-2018-0040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0040"
    },
    {
      "name": "CVE-2016-5419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-5419"
    },
    {
      "name": "CVE-2017-12613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
    },
    {
      "name": "CVE-2018-2637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-2637"
    },
    {
      "name": "CVE-2017-10198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-10198"
    },
    {
      "name": "CVE-2017-10355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-10355"
    },
    {
      "name": "CVE-2016-8623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8623"
    },
    {
      "name": "CVE-2017-5754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
    },
    {
      "name": "CVE-2016-3739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-3739"
    },
    {
      "name": "CVE-2018-2663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-2663"
    },
    {
      "name": "CVE-2017-15896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-15896"
    },
    {
      "name": "CVE-2018-2579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-2579"
    },
    {
      "name": "CVE-2017-8816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-8816"
    },
    {
      "name": "CVE-2017-5753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
    },
    {
      "name": "CVE-2016-7167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7167"
    },
    {
      "name": "CVE-2017-9502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9502"
    },
    {
      "name": "CVE-2018-0030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0030"
    },
    {
      "name": "CVE-2018-0034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0034"
    },
    {
      "name": "CVE-2018-2633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-2633"
    },
    {
      "name": "CVE-2000-0973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2000-0973"
    },
    {
      "name": "CVE-2014-0139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0139"
    },
    {
      "name": "CVE-2016-5420",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-5420"
    },
    {
      "name": "CVE-2016-7141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7141"
    },
    {
      "name": "CVE-2014-0138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0138"
    },
    {
      "name": "CVE-2016-8621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8621"
    },
    {
      "name": "CVE-2018-0029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0029"
    },
    {
      "name": "CVE-2018-0025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0025"
    },
    {
      "name": "CVE-2017-1000254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000254"
    },
    {
      "name": "CVE-2018-2599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-2599"
    },
    {
      "name": "CVE-2017-8817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-8817"
    },
    {
      "name": "CVE-2017-10356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-10356"
    },
    {
      "name": "CVE-2018-0038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0038"
    },
    {
      "name": "CVE-2016-9586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-9586"
    },
    {
      "name": "CVE-2017-1000100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000100"
    },
    {
      "name": "CVE-2017-10345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-10345"
    },
    {
      "name": "CVE-2018-0041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0041"
    },
    {
      "name": "CVE-2017-5715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
    },
    {
      "name": "CVE-2018-2629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-2629"
    },
    {
      "name": "CVE-2016-8622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8622"
    },
    {
      "name": "CVE-2013-2174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-2174"
    },
    {
      "name": "CVE-2018-1000007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
    },
    {
      "name": "CVE-2018-0032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0032"
    },
    {
      "name": "CVE-2016-5421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-5421"
    },
    {
      "name": "CVE-2018-2678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-2678"
    },
    {
      "name": "CVE-2014-0015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0015"
    },
    {
      "name": "CVE-2017-1000099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000099"
    },
    {
      "name": "CVE-2018-2588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-2588"
    },
    {
      "name": "CVE-2018-1000122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
    },
    {
      "name": "CVE-2017-3145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3145"
    },
    {
      "name": "CVE-2016-8625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
    },
    {
      "name": "CVE-2018-0026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0026"
    },
    {
      "name": "CVE-2016-0755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0755"
    }
  ],
  "initial_release_date": "2018-07-12T00:00:00",
  "last_revision_date": "2018-07-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2018-AVI-339",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2018-07-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10869 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10869\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10866 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10866\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10874 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10874\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10863 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10863\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10871 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10871\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10857 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10857\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10868 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10868\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10859 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10859\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10872 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10872\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10858 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10858\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10861 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10861\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10860 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10860\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10864 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10864\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10873 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10873\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10865 du 11 juillet 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10865\u0026cat=SIRT_1\u0026actp=LIST"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…