Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-33151 (GCVE-0-2026-33151)
Vulnerability from cvelistv5 – Published: 2026-03-20 20:13 – Updated: 2026-03-23 16:50
VLAI?
EPSS
Title
socket.io allows an unbounded number of binary attachments
Summary
Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. Prior to versions 3.3.5, 3.4.4, and 4.2.6, a specially crafted Socket.IO packet can make the server wait for a large number of binary attachments and buffer them, which can be exploited to make the server run out of memory. This issue has been patched in versions 3.3.5, 3.4.4, and 4.2.6.
Severity ?
CWE
Assigner
References
4 references
| URL | Tags |
|---|---|
| https://github.com/socketio/socket.io/security/ad… | x_refsource_CONFIRM |
| https://github.com/socketio/socket.io/commit/719f… | x_refsource_MISC |
| https://github.com/socketio/socket.io/commit/9d39… | x_refsource_MISC |
| https://github.com/socketio/socket.io/commit/b257… | x_refsource_MISC |
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-33151",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-23T16:50:08.681178Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-23T16:50:16.998Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "socket.io",
"vendor": "socketio",
"versions": [
{
"status": "affected",
"version": "\u003c 3.3.5"
},
{
"status": "affected",
"version": "\u003e= 3.4.0, \u003c 3.4.4"
},
{
"status": "affected",
"version": "\u003e= 4.0.0, \u003c 4.2.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. Prior to versions 3.3.5, 3.4.4, and 4.2.6, a specially crafted Socket.IO packet can make the server wait for a large number of binary attachments and buffer them, which can be exploited to make the server run out of memory. This issue has been patched in versions 3.3.5, 3.4.4, and 4.2.6."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-754",
"description": "CWE-754: Improper Check for Unusual or Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-20T20:13:31.424Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9"
},
{
"name": "https://github.com/socketio/socket.io/commit/719f9ebab0772ffb882bd614b387e585c1aa75d4",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/socketio/socket.io/commit/719f9ebab0772ffb882bd614b387e585c1aa75d4"
},
{
"name": "https://github.com/socketio/socket.io/commit/9d39f1f080510f036782f2177fac701cc041faaf",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/socketio/socket.io/commit/9d39f1f080510f036782f2177fac701cc041faaf"
},
{
"name": "https://github.com/socketio/socket.io/commit/b25738c416c4e32fbff62ee182afa8f6d0dacf78",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/socketio/socket.io/commit/b25738c416c4e32fbff62ee182afa8f6d0dacf78"
}
],
"source": {
"advisory": "GHSA-677m-j7p3-52f9",
"discovery": "UNKNOWN"
},
"title": "socket.io allows an unbounded number of binary attachments"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-33151",
"datePublished": "2026-03-20T20:13:31.424Z",
"dateReserved": "2026-03-17T21:17:08.885Z",
"dateUpdated": "2026-03-23T16:50:16.998Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-33151",
"date": "2026-05-21",
"epss": "0.0006",
"percentile": "0.18556"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-33151\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-03-20T21:17:15.573\",\"lastModified\":\"2026-04-14T18:22:20.150\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. Prior to versions 3.3.5, 3.4.4, and 4.2.6, a specially crafted Socket.IO packet can make the server wait for a large number of binary attachments and buffer them, which can be exploited to make the server run out of memory. This issue has been patched in versions 3.3.5, 3.4.4, and 4.2.6.\"},{\"lang\":\"es\",\"value\":\"Socket.IO es un framework de comunicaci\u00f3n de c\u00f3digo abierto, en tiempo real, bidireccional y basado en eventos. Antes de las versiones 3.3.5, 3.4.4 y 4.2.6, un paquete de Socket.IO especialmente dise\u00f1ado puede hacer que el servidor espere un gran n\u00famero de adjuntos binarios y los almacene en b\u00fafer, lo cual puede ser explotado para agotar la memoria del servidor. Este problema ha sido parcheado en las versiones 3.3.5, 3.4.4 y 4.2.6.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-754\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:socket:socket.io-parser:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"3.3.5\",\"matchCriteriaId\":\"BBB43B3E-5E3E-4EDA-8748-E9DF4939767E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:socket:socket.io-parser:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"3.4.0\",\"versionEndExcluding\":\"3.4.4\",\"matchCriteriaId\":\"3CF6E321-6910-4470-975B-E9D4C9ABF4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:socket:socket.io-parser:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.6\",\"matchCriteriaId\":\"6E19A7BD-B307-4907-B0DA-C7C826E682A3\"}]}]}],\"references\":[{\"url\":\"https://github.com/socketio/socket.io/commit/719f9ebab0772ffb882bd614b387e585c1aa75d4\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/socketio/socket.io/commit/9d39f1f080510f036782f2177fac701cc041faaf\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/socketio/socket.io/commit/b25738c416c4e32fbff62ee182afa8f6d0dacf78\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-33151\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-23T16:50:08.681178Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-23T16:50:13.767Z\"}}], \"cna\": {\"title\": \"socket.io allows an unbounded number of binary attachments\", \"source\": {\"advisory\": \"GHSA-677m-j7p3-52f9\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 8.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"socketio\", \"product\": \"socket.io\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 3.3.5\"}, {\"status\": \"affected\", \"version\": \"\u003e= 3.4.0, \u003c 3.4.4\"}, {\"status\": \"affected\", \"version\": \"\u003e= 4.0.0, \u003c 4.2.6\"}]}], \"references\": [{\"url\": \"https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9\", \"name\": \"https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/socketio/socket.io/commit/719f9ebab0772ffb882bd614b387e585c1aa75d4\", \"name\": \"https://github.com/socketio/socket.io/commit/719f9ebab0772ffb882bd614b387e585c1aa75d4\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/socketio/socket.io/commit/9d39f1f080510f036782f2177fac701cc041faaf\", \"name\": \"https://github.com/socketio/socket.io/commit/9d39f1f080510f036782f2177fac701cc041faaf\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/socketio/socket.io/commit/b25738c416c4e32fbff62ee182afa8f6d0dacf78\", \"name\": \"https://github.com/socketio/socket.io/commit/b25738c416c4e32fbff62ee182afa8f6d0dacf78\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. Prior to versions 3.3.5, 3.4.4, and 4.2.6, a specially crafted Socket.IO packet can make the server wait for a large number of binary attachments and buffer them, which can be exploited to make the server run out of memory. This issue has been patched in versions 3.3.5, 3.4.4, and 4.2.6.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20: Improper Input Validation\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-754\", \"description\": \"CWE-754: Improper Check for Unusual or Exceptional Conditions\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-03-20T20:13:31.424Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-33151\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-23T16:50:16.998Z\", \"dateReserved\": \"2026-03-17T21:17:08.885Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-03-20T20:13:31.424Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-33151
Vulnerability from fkie_nvd - Published: 2026-03-20 21:17 - Updated: 2026-04-14 18:22
Severity ?
Summary
Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. Prior to versions 3.3.5, 3.4.4, and 4.2.6, a specially crafted Socket.IO packet can make the server wait for a large number of binary attachments and buffer them, which can be exploited to make the server run out of memory. This issue has been patched in versions 3.3.5, 3.4.4, and 4.2.6.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| socket | socket.io-parser | * | |
| socket | socket.io-parser | * | |
| socket | socket.io-parser | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:socket:socket.io-parser:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "BBB43B3E-5E3E-4EDA-8748-E9DF4939767E",
"versionEndExcluding": "3.3.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:socket:socket.io-parser:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3CF6E321-6910-4470-975B-E9D4C9ABF4E2",
"versionEndExcluding": "3.4.4",
"versionStartIncluding": "3.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:socket:socket.io-parser:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "6E19A7BD-B307-4907-B0DA-C7C826E682A3",
"versionEndExcluding": "4.2.6",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. Prior to versions 3.3.5, 3.4.4, and 4.2.6, a specially crafted Socket.IO packet can make the server wait for a large number of binary attachments and buffer them, which can be exploited to make the server run out of memory. This issue has been patched in versions 3.3.5, 3.4.4, and 4.2.6."
},
{
"lang": "es",
"value": "Socket.IO es un framework de comunicaci\u00f3n de c\u00f3digo abierto, en tiempo real, bidireccional y basado en eventos. Antes de las versiones 3.3.5, 3.4.4 y 4.2.6, un paquete de Socket.IO especialmente dise\u00f1ado puede hacer que el servidor espere un gran n\u00famero de adjuntos binarios y los almacene en b\u00fafer, lo cual puede ser explotado para agotar la memoria del servidor. Este problema ha sido parcheado en las versiones 3.3.5, 3.4.4 y 4.2.6."
}
],
"id": "CVE-2026-33151",
"lastModified": "2026-04-14T18:22:20.150",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-03-20T21:17:15.573",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/socketio/socket.io/commit/719f9ebab0772ffb882bd614b387e585c1aa75d4"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/socketio/socket.io/commit/9d39f1f080510f036782f2177fac701cc041faaf"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/socketio/socket.io/commit/b25738c416c4e32fbff62ee182afa8f6d0dacf78"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-754"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-677M-J7P3-52F9
Vulnerability from github – Published: 2026-03-18 17:26 – Updated: 2026-03-20 21:33
VLAI?
Summary
socket.io allows an unbounded number of binary attachments
Details
Impact
A specially crafted Socket.IO packet can make the server wait for a large number of binary attachments and buffer them, which can be exploited to make the server run out of memory.
Patches
| Version range | Used by | Fixed version |
|---|---|---|
>=4.0.0 <4.2.6 |
socket.io@4.x and socket.io-client@4.x |
4.2.6 |
>=3.4.0 <3.4.4 |
socket.io@2.x |
3.4.4 |
<3.3.5 |
socket.io-client@2.x |
3.3.5 |
Workarounds
There is no known workaround except upgrading to a safe version.
For more information
If you have any questions or comments about this advisory:
- Open a discussion here
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "socket.io-parser"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.3.5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "socket.io-parser"
},
"ranges": [
{
"events": [
{
"introduced": "3.4.0"
},
{
"fixed": "3.4.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "socket.io-parser"
},
"ranges": [
{
"events": [
{
"introduced": "4.0.0"
},
{
"fixed": "4.2.6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-33151"
],
"database_specific": {
"cwe_ids": [
"CWE-754"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-18T17:26:14Z",
"nvd_published_at": "2026-03-20T21:17:15Z",
"severity": "HIGH"
},
"details": "### Impact\n\nA specially crafted Socket.IO packet can make the server wait for a large number of binary attachments and buffer them, which can be exploited to make the server run out of memory.\n\n### Patches\n\n| Version range | Used by | Fixed version |\n|------------------|--------------------------------------------|---------------|\n| `\u003e=4.0.0 \u003c4.2.6` | `socket.io@4.x` and `socket.io-client@4.x` | `4.2.6` |\n| `\u003e=3.4.0 \u003c3.4.4` | `socket.io@2.x` | `3.4.4` |\n| `\u003c3.3.5` | `socket.io-client@2.x` | `3.3.5` |\n\n### Workarounds\n\nThere is no known workaround except upgrading to a safe version.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n- Open a discussion [here](https://github.com/socketio/socket.io/discussions)",
"id": "GHSA-677m-j7p3-52f9",
"modified": "2026-03-20T21:33:51Z",
"published": "2026-03-18T17:26:14Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33151"
},
{
"type": "WEB",
"url": "https://github.com/socketio/socket.io/commit/719f9ebab0772ffb882bd614b387e585c1aa75d4"
},
{
"type": "WEB",
"url": "https://github.com/socketio/socket.io/commit/9d39f1f080510f036782f2177fac701cc041faaf"
},
{
"type": "WEB",
"url": "https://github.com/socketio/socket.io/commit/b25738c416c4e32fbff62ee182afa8f6d0dacf78"
},
{
"type": "PACKAGE",
"url": "https://github.com/socketio/socket.io"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "socket.io allows an unbounded number of binary attachments"
}
WID-SEC-W-2026-1407
Vulnerability from csaf_certbund - Published: 2026-05-06 22:00 - Updated: 2026-05-20 22:00Summary
IBM App Connect Enterprise Certified Container: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: IBM App Connect Enterprise kombiniert die branchenbewährten Technologien des IBM Integration Bus mit Cloud-nativen Technologien.
Angriff: Ein Angreifer kann mehrere Schwachstellen in IBM App Connect Enterprise Certified Container ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, Cross-Site-Scripting-Angriffe durchzuführen, Daten zu manipulieren, vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand zu verursachen.
Betroffene Betriebssysteme: - Sonstiges
- UNIX
- Windows
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
References
8 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM App Connect Enterprise kombiniert die branchenbew\u00e4hrten Technologien des IBM Integration Bus mit Cloud-nativen Technologien.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in IBM App Connect Enterprise Certified Container ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1407 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1407.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1407 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1407"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7271907 vom 2026-05-06",
"url": "https://www.ibm.com/support/pages/node/7271907"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7271908 vom 2026-05-06",
"url": "https://www.ibm.com/support/pages/node/7271908"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7271910 vom 2026-05-06",
"url": "https://www.ibm.com/support/pages/node/7271910"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2026-85B819B928 vom 2026-05-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-85b819b928"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:17123 vom 2026-05-13",
"url": "https://access.redhat.com/errata/RHSA-2026:17123"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:17449 vom 2026-05-20",
"url": "https://access.redhat.com/errata/RHSA-2026:17449"
}
],
"source_lang": "en-US",
"title": "IBM App Connect Enterprise Certified Container: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-05-20T22:00:00.000+00:00",
"generator": {
"date": "2026-05-21T07:57:58.711+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.6.0"
}
},
"id": "WID-SEC-W-2026-1407",
"initial_release_date": "2026-05-06T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-05-06T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-05-07T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2026-05-14T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-05-20T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Certified Container Operator \u003c13.1.0",
"product": {
"name": "IBM App Connect Enterprise Certified Container Operator \u003c13.1.0",
"product_id": "T053656"
}
},
{
"category": "product_version",
"name": "Certified Container Operator 13.1.0",
"product": {
"name": "IBM App Connect Enterprise Certified Container Operator 13.1.0",
"product_id": "T053656-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:certified_container_operator__13.1.0"
}
}
},
{
"category": "product_version_range",
"name": "Certified Container Operator \u003c12.0.23",
"product": {
"name": "IBM App Connect Enterprise Certified Container Operator \u003c12.0.23",
"product_id": "T053657"
}
},
{
"category": "product_version",
"name": "Certified Container Operator 12.0.23",
"product": {
"name": "IBM App Connect Enterprise Certified Container Operator 12.0.23",
"product_id": "T053657-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:certified_container_operator__12.0.23"
}
}
}
],
"category": "product_name",
"name": "App Connect Enterprise"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "9 Multicluster Engine for Kubernetes 2.8.6",
"product": {
"name": "Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6",
"product_id": "T054027",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-26013",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-26013"
},
{
"cve": "CVE-2026-27142",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-27142"
},
{
"cve": "CVE-2026-28277",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-28277"
},
{
"cve": "CVE-2026-28684",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-28684"
},
{
"cve": "CVE-2026-32288",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-32288"
},
{
"cve": "CVE-2026-33151",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33151"
},
{
"cve": "CVE-2026-33349",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33349"
},
{
"cve": "CVE-2026-33532",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33532"
},
{
"cve": "CVE-2026-33891",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33891"
},
{
"cve": "CVE-2026-33894",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33894"
},
{
"cve": "CVE-2026-33895",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33895"
},
{
"cve": "CVE-2026-33896",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33896"
},
{
"cve": "CVE-2026-33916",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33916"
},
{
"cve": "CVE-2026-34601",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-34601"
},
{
"cve": "CVE-2026-35469",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-35469"
},
{
"cve": "CVE-2026-39406",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-39406"
},
{
"cve": "CVE-2026-39407",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-39407"
},
{
"cve": "CVE-2026-39408",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-39408"
},
{
"cve": "CVE-2026-39409",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-39409"
},
{
"cve": "CVE-2026-39410",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-39410"
},
{
"cve": "CVE-2026-39983",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-39983"
},
{
"cve": "CVE-2026-40175",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-40175"
},
{
"cve": "CVE-2026-40347",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-40347"
},
{
"cve": "CVE-2026-40895",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-40895"
},
{
"cve": "CVE-2026-41238",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-41238"
},
{
"cve": "CVE-2026-41239",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-41239"
},
{
"cve": "CVE-2026-41240",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-41240"
},
{
"cve": "CVE-2026-4923",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-4923"
},
{
"cve": "CVE-2026-4926",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-4926"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…