var-200605-0112
Vulnerability from variot

The HTTP proxy in Symantec Gateway Security 5000 Series 2.0.1 and 3.0, and Enterprise Firewall 8.0, when NAT is being used, allows remote attackers to determine internal IP addresses by using malformed HTTP requests, as demonstrated using a get request without a space separating the URI. Symantec Enterprise Firewall and Gateway Security products are prone to an information-disclosure weakness. The vendor has reported that the NAT/HTTP proxy component of the products may reveal the internal IP addresses of protected computers. An attacker may use this information to carry out targeted attacks against a potentially vulnerable host.

The weakness is caused due to an error when generating responses to certain HTTP requests.

SOLUTION: Apply product updates. http://www.symantec.com/techsupp/enterprise/select_product_updates.html

PROVIDED AND/OR DISCOVERED BY: The vendor credits Bernhard Mueller.

ORIGINAL ADVISORY: Symantec: http://securityresponse.symantec.com/avcenter/security/Content/2006.05.10.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200605-0112",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "enterprise firewall",
        "scope": "eq",
        "trust": 2.7,
        "vendor": "symantec",
        "version": "8.0"
      },
      {
        "model": "gateway security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "5000_series_2.0.1"
      },
      {
        "model": "gateway security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "3.0"
      },
      {
        "model": "gateway security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "5000_series_3.0"
      },
      {
        "model": "gateway security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "2.0.1"
      },
      {
        "model": "gateway security series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "50003.0"
      },
      {
        "model": "gateway security series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "50002.0.1"
      },
      {
        "model": "gateway security series",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "50003.0.1"
      },
      {
        "model": "gateway security appliance",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "16003.0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "17936"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-225"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2341"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:symantec:enterprise_firewall",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000277"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Bernhard Mueller research@sec-consult.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-225"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2006-2341",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2006-2341",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-18449",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2006-2341",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2006-2341",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200605-225",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-18449",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-18449"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-225"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2341"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The HTTP proxy in Symantec Gateway Security 5000 Series 2.0.1 and 3.0, and Enterprise Firewall 8.0, when NAT is being used, allows remote attackers to determine internal IP addresses by using malformed HTTP requests, as demonstrated using a get request without a space separating the URI. Symantec Enterprise Firewall and Gateway Security products are prone to an information-disclosure weakness. \nThe vendor has reported that the NAT/HTTP proxy component of the products may reveal the internal IP addresses of protected computers. \nAn attacker may use this information to carry out targeted attacks against a potentially vulnerable host. \n\nThe weakness is caused due to an error when generating responses to\ncertain HTTP requests. \n\nSOLUTION:\nApply product updates. \nhttp://www.symantec.com/techsupp/enterprise/select_product_updates.html\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Bernhard Mueller. \n\nORIGINAL ADVISORY:\nSymantec:\nhttp://securityresponse.symantec.com/avcenter/security/Content/2006.05.10.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-2341"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000277"
      },
      {
        "db": "BID",
        "id": "17936"
      },
      {
        "db": "VULHUB",
        "id": "VHN-18449"
      },
      {
        "db": "PACKETSTORM",
        "id": "46250"
      }
    ],
    "trust": 2.07
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-18449",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-18449"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2006-2341",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "17936",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "20082",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-1764",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1016058",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1016057",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000277",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-225",
        "trust": 0.7
      },
      {
        "db": "BUGTRAQ",
        "id": "20060512 SEC CONSULT SA-20060512-0 :: SYMANTEC ENTERPRISE FIREWALL NAT/HTTP PROXY PRIVATE IP EXPOSURE",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "26370",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "27852",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-81443",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-18449",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "46250",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-18449"
      },
      {
        "db": "BID",
        "id": "17936"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000277"
      },
      {
        "db": "PACKETSTORM",
        "id": "46250"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-225"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2341"
      }
    ]
  },
  "id": "VAR-200605-0112",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-18449"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T22:40:03.408000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SYM06-009",
        "trust": 0.8,
        "url": "http://www.symantec.com/region/jp/avcenter/security/content/2006.05.10.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000277"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-18449"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2341"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://securityresponse.symantec.com/avcenter/security/content/2006.05.10.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/17936"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1016057"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1016058"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/20082"
      },
      {
        "trust": 1.4,
        "url": "http://www.frsirt.com/english/advisories/2006/1764"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/433876/30/5040/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2006/1764"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26370"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2341"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-2341"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/26370"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/433876/30/5040/threaded"
      },
      {
        "trust": 0.4,
        "url": "http://www.symantec.com/techsupp/enterprise/select_product_updates.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.sec-consult.com/261.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.symantec.com"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/433876"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9881/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3587/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6648/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/20082/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-18449"
      },
      {
        "db": "BID",
        "id": "17936"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000277"
      },
      {
        "db": "PACKETSTORM",
        "id": "46250"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-225"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2341"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-18449"
      },
      {
        "db": "BID",
        "id": "17936"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000277"
      },
      {
        "db": "PACKETSTORM",
        "id": "46250"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-225"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2341"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-05-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-18449"
      },
      {
        "date": "2006-05-10T00:00:00",
        "db": "BID",
        "id": "17936"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-000277"
      },
      {
        "date": "2006-05-17T05:39:52",
        "db": "PACKETSTORM",
        "id": "46250"
      },
      {
        "date": "2006-05-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200605-225"
      },
      {
        "date": "2006-05-12T01:02:00",
        "db": "NVD",
        "id": "CVE-2006-2341"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-18449"
      },
      {
        "date": "2006-05-15T17:59:00",
        "db": "BID",
        "id": "17936"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-000277"
      },
      {
        "date": "2013-01-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200605-225"
      },
      {
        "date": "2024-11-21T00:11:06.510000",
        "db": "NVD",
        "id": "CVE-2006-2341"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-225"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Symantec Enterprise Firewall Inside  IP Address disclosure vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000277"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-225"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…