VAR-200412-0260

Vulnerability from variot - Updated: 2023-12-18 13:05

Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss). Multiple unspecified remote vulnerabilities reportedly affect Kerio's WinRoute Firewall. These issues are likely due to design errors and a failure or the application to properly handle malformed network data, although this is not verified. The first issue is a remote denial of service that may cause the affected computer to crash or hang. The second issue is a DNS cache poisoning vulnerability. The final issue is an information disclosure vulnerability. An attacker may exploit these issues to gain access to otherwise restricted information and manipulate the DNS cache of the affected firewall, potentially facilitating further attacks against the affected network. Also an attacker may leverage these issues to cause the affected computer to crash or hang, facilitating a denial of service condition. TITLE: Kerio WinRoute Firewall Unspecified DNS Cache Poisoning Vulnerability

SECUNIA ADVISORY ID: SA13374

VERIFY ADVISORY: http://secunia.com/advisories/13374/

CRITICAL: Moderately critical

IMPACT: Spoofing, Manipulation of data

WHERE:

From remote

SOFTWARE: Kerio WinRoute Firewall 6.x http://secunia.com/product/3613/

DESCRIPTION: A vulnerability has been reported in Kerio WinRoute Firewall, which can be exploited by malicious people to poison the DNS cache.

The vulnerability is caused due to an unspecified error and can be exploited to insert fake information in the DNS cache.

The vulnerability has been reported in version 6.0.8. Prior versions may also be affected.

NOTE: Other issues have also been fixed, where some may be security related.

SOLUTION: Update to version 6.0.9. http://www.kerio.com/kwf_download.html

PROVIDED AND/OR DISCOVERED BY: Reported by vendor.


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200412-0260",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0.8"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0.7"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0.6"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0.5"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0.4"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0.3"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0.2"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0.1"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.0"
      },
      {
        "model": "winroute firewall",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "kerio",
        "version": "6.0.9"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "11870"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2483"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-708"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-2483"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The individual or individuals responsible for the discovery of these issues are currently unknown; the vendor disclosed these issues.",
    "sources": [
      {
        "db": "BID",
        "id": "11870"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-708"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2004-2483",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-10911",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2004-2483",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200412-708",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-10911",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10911"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2483"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-708"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss). Multiple unspecified remote vulnerabilities reportedly affect Kerio\u0027s WinRoute Firewall.  These issues are likely due to design errors and a failure or the application to properly handle malformed network data, although this is not verified. \nThe first issue is a remote denial of service that may cause the affected computer to crash or hang.  The second issue is a DNS cache poisoning vulnerability. The final issue is an information disclosure vulnerability. \nAn attacker may exploit these issues to gain access to otherwise restricted information and manipulate the DNS cache of the affected firewall, potentially facilitating further attacks against the affected network. Also an attacker may leverage these issues to cause the affected computer to crash or hang, facilitating a denial of service condition. \nTITLE:\nKerio WinRoute Firewall Unspecified DNS Cache Poisoning Vulnerability\n\nSECUNIA ADVISORY ID:\nSA13374\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/13374/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSpoofing, Manipulation of data\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nKerio WinRoute Firewall 6.x\nhttp://secunia.com/product/3613/\n\nDESCRIPTION:\nA vulnerability has been reported in Kerio WinRoute Firewall, which\ncan be exploited by malicious people to poison the DNS cache. \n\nThe vulnerability is caused due to an unspecified error and can be\nexploited to insert fake information in the DNS cache. \n\nThe vulnerability has been reported in version 6.0.8. Prior versions\nmay also be affected. \n\nNOTE: Other issues have also been fixed, where some may be security\nrelated. \n\nSOLUTION:\nUpdate to version 6.0.9. \nhttp://www.kerio.com/kwf_download.html\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by vendor. \n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-2483"
      },
      {
        "db": "BID",
        "id": "11870"
      },
      {
        "db": "VULHUB",
        "id": "VHN-10911"
      },
      {
        "db": "PACKETSTORM",
        "id": "35286"
      }
    ],
    "trust": 1.35
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "11870",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "13374",
        "trust": 1.8
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2483",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "12294",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "12293",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-708",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "18410",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-10911",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "35286",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10911"
      },
      {
        "db": "BID",
        "id": "11870"
      },
      {
        "db": "PACKETSTORM",
        "id": "35286"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2483"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-708"
      }
    ]
  },
  "id": "VAR-200412-0260",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10911"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:05:30.853000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-2483"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/11870"
      },
      {
        "trust": 1.7,
        "url": "http://www.kerio.com/security_advisory.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/12293"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/12294"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/13374"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18410"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/18410"
      },
      {
        "trust": 0.3,
        "url": "http://www.kerio.com"
      },
      {
        "trust": 0.3,
        "url": "http://www.kerio.com/kwf_home.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.kerio.com/kwf_history.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3613/"
      },
      {
        "trust": 0.1,
        "url": "http://www.kerio.com/kwf_download.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/13374/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10911"
      },
      {
        "db": "BID",
        "id": "11870"
      },
      {
        "db": "PACKETSTORM",
        "id": "35286"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2483"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-708"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-10911"
      },
      {
        "db": "BID",
        "id": "11870"
      },
      {
        "db": "PACKETSTORM",
        "id": "35286"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2483"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-708"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-12-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-10911"
      },
      {
        "date": "2004-12-10T00:00:00",
        "db": "BID",
        "id": "11870"
      },
      {
        "date": "2004-12-12T19:36:48",
        "db": "PACKETSTORM",
        "id": "35286"
      },
      {
        "date": "2004-12-31T05:00:00",
        "db": "NVD",
        "id": "CVE-2004-2483"
      },
      {
        "date": "2004-12-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200412-708"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-10911"
      },
      {
        "date": "2004-12-10T00:00:00",
        "db": "BID",
        "id": "11870"
      },
      {
        "date": "2017-07-11T01:31:56.310000",
        "db": "NVD",
        "id": "CVE-2004-2483"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200412-708"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-708"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kerio WinRoute Multiple undefined remote vulnerabilities in firmware",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-708"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "11870"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-708"
      }
    ],
    "trust": 0.9
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…