var-200505-0910
Vulnerability from variot

Buffer overflow in Apple iTunes 4.7 allows remote attackers to execute arbitrary code via a long URL in (1) .m3u or (2) .pls playlist files. This issue is exposed when the application parses 'm3u' and 'pls' playlist files. As these files may originate from an external source, this issue is considered remotely exploitable. If the vulnerability is successfully exploited, it will result in execution of arbitrary code in the context of the user running the application. Apple iTunes is a media player program. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

APPLE-SA-2005-01-11 iTunes 4.7.1

iTunes 4.7.1 is now available and delivers the following security enhancement:

CVE-ID: CAN-2005-0043

Impact: Malicious playlists can cause iTunes to crash and could execute arbitrary code

Description: iTunes supports several common playlist formats. Credit to Sean de Regge (seanderegge[at]hotmail.com) for discovering this issue, and to iDEFENSE Labs for reporting it to us.

Available for: Mac OS X, Microsoft Windows XP, Microsoft Windows 2000

iTunes 4.7.1 may be obtained from the Software Update pane in System Preferences, or Apple's iTunes download site: http://www.apple.com/itunes/download/

The download file is named: "iTunes4.7.1.dmg" Its SHA-1 digest is: 2ae8c815f18756c24dfbc1ac7d837b75b828b92a

Information will also be posted to the Apple Product Security web site: http://docs.info.apple.com/article.html?artnum=61798

This message is signed with Apple's Product Security PGP key, and details are available at: http://www.apple.com/support/security/security_pgp.html

-----BEGIN PGP SIGNATURE----- Version: PGP 8.1

iQEVAwUBQeQviJyw5owIz4TQAQIMrgf/fYmI5LZy5DM5a61kbXgnzq5OpQQPaidH disRa8UbjGrr+sSvEytQaxgO5vbDsZWgDGYeeaHTUeyiBdznO/b7X9moUC0uXEtC /a/CC2219AYeoQLJCMWhiIbrkL3OQ8QHoV3KaMlcg98tHgsrZKg1ssqEZszkjNrV Jj1dm3hYn2/DHPqzhGy2+l4Lp/8Bdg2VwXJjCLrqD6cgcSAX0HVdVq+CM2VQ1DGH O9PjkspNxoTR2iV0VbJdc+q/Mi1HXlouNaURgR01oBYGqZoQ2mxYGMLIthgVoyri E/c5iyPq4lwDnhyjii4fajLO/3BW6MY7RVoNWv2ipYjVi1RPQ6d6iQ== =SryY -----END PGP SIGNATURE-----

-- David Mirza Ahmad Symantec

PGP: 0x26005712 8D 9A B1 33 82 3D B3 D0 40 EB AB F0 1E 67 C6 1A 26 00 57 12

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200505-0910",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "itunes",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "apple",
        "version": "4.7"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": "itunes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4.6"
      },
      {
        "model": "itunes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4.5"
      },
      {
        "model": "itunes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4.2.72"
      },
      {
        "model": "itunes",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4.7.1"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#377368"
      },
      {
        "db": "BID",
        "id": "12238"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-661"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0043"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sean de Regge\u203b seanderegge@hotmail.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-661"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2005-0043",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2005-0043",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-11252",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2005-0043",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#377368",
            "trust": 0.8,
            "value": "30.38"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200505-661",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-11252",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#377368"
      },
      {
        "db": "VULHUB",
        "id": "VHN-11252"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-661"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0043"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in Apple iTunes 4.7 allows remote attackers to execute arbitrary code via a long URL in (1) .m3u or (2) .pls playlist files.  This issue is exposed when the application parses \u0027m3u\u0027 and \u0027pls\u0027 playlist files.  As these files may originate from an external source, this issue is considered remotely exploitable. \nIf the vulnerability is successfully exploited, it will result in execution of arbitrary code in the context of the user running the application. Apple iTunes is a media player program. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2005-01-11 iTunes 4.7.1\n\niTunes 4.7.1 is now available and delivers the following security\nenhancement:\n\nCVE-ID:  CAN-2005-0043\n\nImpact:  Malicious playlists can cause iTunes to crash and could\nexecute arbitrary code\n\nDescription:  iTunes supports several common playlist formats.  Credit to Sean de Regge\n(seanderegge[at]hotmail.com) for discovering this issue, and to\niDEFENSE Labs for reporting it to us. \n\nAvailable for:  Mac OS X, Microsoft Windows XP, Microsoft Windows\n2000\n\niTunes 4.7.1 may be obtained from the Software Update pane in System\nPreferences, or Apple\u0027s iTunes download site:\nhttp://www.apple.com/itunes/download/\n\nThe download file is named: \"iTunes4.7.1.dmg\"\nIts SHA-1 digest is:  2ae8c815f18756c24dfbc1ac7d837b75b828b92a\n\nInformation will also be posted to the Apple Product Security\nweb site:\nhttp://docs.info.apple.com/article.html?artnum=61798\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttp://www.apple.com/support/security/security_pgp.html\n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP 8.1\n\niQEVAwUBQeQviJyw5owIz4TQAQIMrgf/fYmI5LZy5DM5a61kbXgnzq5OpQQPaidH\ndisRa8UbjGrr+sSvEytQaxgO5vbDsZWgDGYeeaHTUeyiBdznO/b7X9moUC0uXEtC\n/a/CC2219AYeoQLJCMWhiIbrkL3OQ8QHoV3KaMlcg98tHgsrZKg1ssqEZszkjNrV\nJj1dm3hYn2/DHPqzhGy2+l4Lp/8Bdg2VwXJjCLrqD6cgcSAX0HVdVq+CM2VQ1DGH\nO9PjkspNxoTR2iV0VbJdc+q/Mi1HXlouNaURgR01oBYGqZoQ2mxYGMLIthgVoyri\nE/c5iyPq4lwDnhyjii4fajLO/3BW6MY7RVoNWv2ipYjVi1RPQ6d6iQ==\n=SryY\n-----END PGP SIGNATURE-----\n\n-- \nDavid Mirza Ahmad\nSymantec \n\nPGP: 0x26005712\n8D 9A B1 33 82 3D B3 D0 40 EB  AB F0 1E 67 C6 1A 26 00 57 12\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0043"
      },
      {
        "db": "CERT/CC",
        "id": "VU#377368"
      },
      {
        "db": "BID",
        "id": "12238"
      },
      {
        "db": "VULHUB",
        "id": "VHN-11252"
      },
      {
        "db": "PACKETSTORM",
        "id": "35698"
      }
    ],
    "trust": 2.07
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-11252",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-11252"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "SECUNIA",
        "id": "13804",
        "trust": 2.5
      },
      {
        "db": "CERT/CC",
        "id": "VU#377368",
        "trust": 2.5
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0043",
        "trust": 2.1
      },
      {
        "db": "BID",
        "id": "12238",
        "trust": 2.0
      },
      {
        "db": "SECTRACK",
        "id": "1012839",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "12833",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-661",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "18851",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "3",
        "trust": 0.6
      },
      {
        "db": "IDEFENSE",
        "id": "20050113 APPLE ITUNES PLAYLIST PARSING BUFFER OVERFLOW VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2005-01-11",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "35698",
        "trust": 0.2
      },
      {
        "db": "EXPLOIT-DB",
        "id": "758",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "16562",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-71076",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "83127",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-11252",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#377368"
      },
      {
        "db": "VULHUB",
        "id": "VHN-11252"
      },
      {
        "db": "BID",
        "id": "12238"
      },
      {
        "db": "PACKETSTORM",
        "id": "35698"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-661"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0043"
      }
    ]
  },
  "id": "VAR-200505-0910",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-11252"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T19:26:53.795000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0043"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2005/jan/msg00000.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/12238"
      },
      {
        "trust": 1.7,
        "url": "http://www.kb.cert.org/vuls/id/377368"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/12833"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1012839"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/13804"
      },
      {
        "trust": 1.6,
        "url": "http://www.idefense.com/application/poi/display?id=180\u0026type=vulnerabilities"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18851"
      },
      {
        "trust": 0.9,
        "url": "http://docs.info.apple.com/article.html?artnum=61798"
      },
      {
        "trust": 0.8,
        "url": "http://idefense.com/application/poi/display?id=180\u0026type=vulnerabilities\u0026flashstatus=true"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/13804/"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/18851"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/itunes/"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/387306"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/387080"
      },
      {
        "trust": 0.1,
        "url": "http://www.idefense.com/application/poi/display?id=180\u0026amp;type=vulnerabilities"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/security/security_pgp.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/itunes/download/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0043"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#377368"
      },
      {
        "db": "VULHUB",
        "id": "VHN-11252"
      },
      {
        "db": "BID",
        "id": "12238"
      },
      {
        "db": "PACKETSTORM",
        "id": "35698"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-661"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0043"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#377368"
      },
      {
        "db": "VULHUB",
        "id": "VHN-11252"
      },
      {
        "db": "BID",
        "id": "12238"
      },
      {
        "db": "PACKETSTORM",
        "id": "35698"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-661"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0043"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-01-14T00:00:00",
        "db": "CERT/CC",
        "id": "VU#377368"
      },
      {
        "date": "2005-05-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-11252"
      },
      {
        "date": "2005-01-11T00:00:00",
        "db": "BID",
        "id": "12238"
      },
      {
        "date": "2005-01-12T08:06:19",
        "db": "PACKETSTORM",
        "id": "35698"
      },
      {
        "date": "2005-01-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-661"
      },
      {
        "date": "2005-05-02T04:00:00",
        "db": "NVD",
        "id": "CVE-2005-0043"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-01-14T00:00:00",
        "db": "CERT/CC",
        "id": "VU#377368"
      },
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-11252"
      },
      {
        "date": "2009-07-12T09:27:00",
        "db": "BID",
        "id": "12238"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-661"
      },
      {
        "date": "2024-11-20T23:54:16.943000",
        "db": "NVD",
        "id": "CVE-2005-0043"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-661"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple iTunes fails to properly handle overly long URLs in playlists",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#377368"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-661"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…