var-201306-0344
Vulnerability from variot
The Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers allow remote attackers to cause a denial of service (device hang) via a crafted LAN_TXT24 parameter to English/pages_MacUS/cgi_lan.cgi followed by a direct request to English/pages_MacUS/lan_set_content.html. NOTE: the vendor has apparently responded by stating "Canon believes that its printers will not have to deal with unauthorized access to the network from an external location as long as the printers are used in a secured environment.". Canon Printer is a printer developed by Canon. Many models of Canon Printer do not correctly handle user-submitted requests, allowing remote attackers to submit special HTTP requests, causing the printer to stop responding and need to be restarted for normal functionality. An attacker can exploit this issue to cause an affected device to stop responding and require a reboot, denying service to legitimate users. Vulnerabilities exist in the following models: MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, MX922. The below 3 issues have been tested and verified working on the following Canon Printer models (May affect more, but this is all I was able to test against): MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920
1 (CVE-2013-4613): Canon printers do not require a password for the
administrative interfaces by default. Unauthorized users on the network may configure the printer. If the printer is exposed to the public internet, anonymous users may make configuration changes as well. This should be corrected by requiring a password, even if only a default, but should recommend users to change it upon initial setup of the device.
2 (CVE-2013-4614): The administrative interface on these printers allow a
user to enter a WEP/WPA/WPA2 pre-shared key. Once a key is entered, when a user browses the configuration page again, they can view the current password in clear-text. Once a password is configured, it should not allow the user to read it again. If the user wants to change the password, they should be required to enter a new one, which then overwrites the old one.
3 (CVE-2013-4615): There is a denial of service condition in the
administrative interface on the devices. Using specially crafted HTTP requests, it is possible to cause the device to no longer respond. This requires the device to be turned off, and then back on again, to which the printer will display a message about not being properly turned off, on the display (if model has a display).
I have disclosed all 3 of these issues to Canon, and unfortunately they do not feel it is necessary to fix them (In all fairness, they're not super high severity). More details, along with PoC and Metasploit modules are available here: * http://www.mattandreko.com/2013/06/canon-y-u-no-security.html*
Timeline: May 27, 2013: Initial Email to vendor's support May 28, 2013: Vendor support emailed for additional details May 28, 2013: Sent a proof-of-concept exploit for the DoS vulnerability to vendor May 30, 2013: Vendor escalated issue internally June 4, 2013: Vendor notification that issue has been escalated to manufacturer June 14, 2013: Vendor notification that they will not fix issues June 18, 2013: Public Disclosure
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0344", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mg3100 printer", "scope": "eq", "trust": 1.6, "vendor": "canon", "version": null }, { "model": "mx870 printer", "scope": "eq", "trust": 1.6, "vendor": "canon", "version": null }, { "model": "mp495 printer", "scope": "eq", "trust": 1.6, "vendor": "canon", "version": null }, { "model": "mg6100 printer", "scope": "eq", "trust": 1.6, "vendor": "canon", "version": null }, { "model": "mx922 printer", "scope": "eq", "trust": 1.6, "vendor": "canon", "version": null }, { "model": "mp340 printer", "scope": "eq", "trust": 1.6, "vendor": "canon", "version": null }, { "model": "mx890 printer", "scope": "eq", "trust": 1.6, "vendor": "canon", "version": null }, { "model": "mx920 printer", "scope": "eq", "trust": 1.6, "vendor": "canon", "version": null }, { "model": "mg5300 printer", "scope": "eq", "trust": 1.6, "vendor": "canon", "version": null }, { "model": "pixma mp495", "scope": null, "trust": 0.8, "vendor": "canon", "version": null }, { "model": "pixma mx340", "scope": null, "trust": 0.8, "vendor": "canon", "version": null }, { "model": "pixma mx920", "scope": null, "trust": 0.8, "vendor": "canon", "version": null }, { "model": "pixma mx922", "scope": null, "trust": 0.8, "vendor": "canon", "version": null }, { "model": "pixus mg3130", "scope": null, "trust": 0.8, "vendor": "canon", "version": null }, { "model": "pixus mg5330", "scope": null, "trust": 0.8, "vendor": "canon", "version": null }, { "model": "pixus mg6130", "scope": null, "trust": 0.8, "vendor": "canon", "version": null }, { "model": "pixus mx870", "scope": null, "trust": 0.8, "vendor": "canon", "version": null }, { "model": "pixus mx893", "scope": null, "trust": 0.8, "vendor": "canon", "version": null }, { "model": "printer mg3100", "scope": null, "trust": 0.6, "vendor": "canon", "version": null }, { "model": "printer mg5300", "scope": null, "trust": 0.6, "vendor": "canon", "version": null }, { "model": "printer mg6100", "scope": null, "trust": 0.6, "vendor": "canon", "version": null }, { "model": "printer mp495", "scope": null, "trust": 0.6, "vendor": "canon", "version": null }, { "model": "printer mx340", "scope": null, "trust": 0.6, "vendor": "canon", "version": null }, { "model": "printer mx870", "scope": null, "trust": 0.6, "vendor": "canon", "version": null }, { "model": "printer mx890", "scope": null, "trust": 0.6, "vendor": "canon", "version": null }, { "model": "printer mx920", "scope": null, "trust": 0.6, "vendor": "canon", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07718" }, { "db": "JVNDB", "id": "JVNDB-2013-003113" }, { "db": "CNNVD", "id": "CNNVD-201306-390" }, { "db": "NVD", "id": "CVE-2013-4615" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:canon:mp495_printer", "vulnerable": true }, { "cpe22Uri": "cpe:/h:canon:mp340_printer", "vulnerable": true }, { "cpe22Uri": "cpe:/h:canon:mx920_printer", "vulnerable": true }, { "cpe22Uri": "cpe:/h:canon:mx922_printer", "vulnerable": true }, { "cpe22Uri": "cpe:/h:canon:mg3100_printer", "vulnerable": true }, { "cpe22Uri": "cpe:/h:canon:mg5300_printer", "vulnerable": true }, { "cpe22Uri": "cpe:/h:canon:mg6100_printer", "vulnerable": true }, { "cpe22Uri": "cpe:/h:canon:mx870_printer", "vulnerable": true }, { "cpe22Uri": "cpe:/h:canon:mx890_printer", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003113" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Matt Andreko", "sources": [ { "db": "BID", "id": "60598" }, { "db": "PACKETSTORM", "id": "122073" }, { "db": "CNNVD", "id": "CNNVD-201306-390" } ], "trust": 1.0 }, "cve": "CVE-2013-4615", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2013-4615", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2013-07718", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-64617", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-4615", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2013-4615", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2013-07718", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201306-390", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-64617", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07718" }, { "db": "VULHUB", "id": "VHN-64617" }, { "db": "JVNDB", "id": "JVNDB-2013-003113" }, { "db": "CNNVD", "id": "CNNVD-201306-390" }, { "db": "NVD", "id": "CVE-2013-4615" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers allow remote attackers to cause a denial of service (device hang) via a crafted LAN_TXT24 parameter to English/pages_MacUS/cgi_lan.cgi followed by a direct request to English/pages_MacUS/lan_set_content.html. NOTE: the vendor has apparently responded by stating \"Canon believes that its printers will not have to deal with unauthorized access to the network from an external location as long as the printers are used in a secured environment.\". Canon Printer is a printer developed by Canon. Many models of Canon Printer do not correctly handle user-submitted requests, allowing remote attackers to submit special HTTP requests, causing the printer to stop responding and need to be restarted for normal functionality. \nAn attacker can exploit this issue to cause an affected device to stop responding and require a reboot, denying service to legitimate users. Vulnerabilities exist in the following models: MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, MX922. The below 3 issues have been tested and verified working on the following\nCanon Printer models (May affect more, but this is all I was able to test\nagainst):\nMG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920\n\n#1 (CVE-2013-4613): Canon printers do not require a password for the\nadministrative interfaces by default. Unauthorized users on the network may\nconfigure the printer. If the printer is exposed to the public internet,\nanonymous users may make configuration changes as well. This should be\ncorrected by requiring a password, even if only a default, but should\nrecommend users to change it upon initial setup of the device. \n\n#2 (CVE-2013-4614): The administrative interface on these printers allow a\nuser to enter a WEP/WPA/WPA2 pre-shared key. Once a key is entered, when a\nuser browses the configuration page again, they can view the current\npassword in clear-text. Once a password is configured, it should not allow\nthe user to read it again. If the user wants to change the password, they\nshould be required to enter a new one, which then overwrites the old one. \n\n#3 (CVE-2013-4615): There is a denial of service condition in the\nadministrative interface on the devices. Using specially crafted HTTP\nrequests, it is possible to cause the device to no longer respond. This\nrequires the device to be turned off, and then back on again, to which the\nprinter will display a message about not being properly turned off, on the\ndisplay (if model has a display). \n\nI have disclosed all 3 of these issues to Canon, and unfortunately they do\nnot feel it is necessary to fix them (In all fairness, they\u0027re not super\nhigh severity). More details, along with PoC and Metasploit modules are\navailable here: *\nhttp://www.mattandreko.com/2013/06/canon-y-u-no-security.html*\n\nTimeline:\nMay 27, 2013: Initial Email to vendor\u0027s support\nMay 28, 2013: Vendor support emailed for additional details\nMay 28, 2013: Sent a proof-of-concept exploit for the DoS vulnerability to\nvendor\nMay 30, 2013: Vendor escalated issue internally\nJune 4, 2013: Vendor notification that issue has been escalated to\nmanufacturer\nJune 14, 2013: Vendor notification that they will not fix issues\nJune 18, 2013: Public Disclosure\n", "sources": [ { "db": "NVD", "id": "CVE-2013-4615" }, { "db": "JVNDB", "id": "JVNDB-2013-003113" }, { "db": "CNVD", "id": "CNVD-2013-07718" }, { "db": "BID", "id": "60598" }, { "db": "VULHUB", "id": "VHN-64617" }, { "db": "PACKETSTORM", "id": "122073" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-4615", "trust": 3.5 }, { "db": "BID", "id": "60598", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2013-003113", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201306-390", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2013-07718", "trust": 0.6 }, { "db": "FULLDISC", "id": "20130618 CANON WIRELESS PRINTER DISCLOSURE \u0026 DOS", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-64617", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "122073", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07718" }, { "db": "VULHUB", "id": "VHN-64617" }, { "db": "BID", "id": "60598" }, { "db": "JVNDB", "id": "JVNDB-2013-003113" }, { "db": "PACKETSTORM", "id": "122073" }, { "db": "CNNVD", "id": "CNNVD-201306-390" }, { "db": "NVD", "id": "CVE-2013-4615" } ] }, "id": "VAR-201306-0344", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-07718" }, { "db": "VULHUB", "id": "VHN-64617" } ], "trust": 1.4083333625 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07718" } ] }, "last_update_date": "2024-11-23T22:02:23.411000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "PIXUS \u5546\u54c1\u4e00\u89a7", "trust": 0.8, "url": "http://cweb.canon.jp/pixus/lineup/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003113" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-64617" }, { "db": "JVNDB", "id": "JVNDB-2013-003113" }, { "db": "NVD", "id": "CVE-2013-4615" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.mattandreko.com/2013/06/canon-y-u-no-security.html" }, { "trust": 2.5, "url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/http/canon_wireless_printer.rb" }, { "trust": 1.7, "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0146.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4615" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4615" }, { "trust": 0.6, "url": "http://seclists.org/fulldisclosure/2013/jun/145" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/60598" }, { "trust": 0.3, "url": "http://www.canon.com/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4614" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4615" }, { "trust": 0.1, "url": "http://www.mattandreko.com/2013/06/canon-y-u-no-security.html*" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4613" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07718" }, { "db": "VULHUB", "id": "VHN-64617" }, { "db": "BID", "id": "60598" }, { "db": "JVNDB", "id": "JVNDB-2013-003113" }, { "db": "PACKETSTORM", "id": "122073" }, { "db": "CNNVD", "id": "CNNVD-201306-390" }, { "db": "NVD", "id": "CVE-2013-4615" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2013-07718" }, { "db": "VULHUB", "id": "VHN-64617" }, { "db": "BID", "id": "60598" }, { "db": "JVNDB", "id": "JVNDB-2013-003113" }, { "db": "PACKETSTORM", "id": "122073" }, { "db": "CNNVD", "id": "CNNVD-201306-390" }, { "db": "NVD", "id": "CVE-2013-4615" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-21T00:00:00", "db": "CNVD", "id": "CNVD-2013-07718" }, { "date": "2013-06-21T00:00:00", "db": "VULHUB", "id": "VHN-64617" }, { "date": "2013-06-18T00:00:00", "db": "BID", "id": "60598" }, { "date": "2013-06-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003113" }, { "date": "2013-06-18T14:23:23", "db": "PACKETSTORM", "id": "122073" }, { "date": "2013-06-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-390" }, { "date": "2013-06-21T21:55:01.057000", "db": "NVD", "id": "CVE-2013-4615" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-21T00:00:00", "db": "CNVD", "id": "CNVD-2013-07718" }, { "date": "2013-06-24T00:00:00", "db": "VULHUB", "id": "VHN-64617" }, { "date": "2013-06-18T00:00:00", "db": "BID", "id": "60598" }, { "date": "2013-06-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003113" }, { "date": "2013-06-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-390" }, { "date": "2024-11-21T01:55:56.153000", "db": "NVD", "id": "CVE-2013-4615" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-390" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Canon Service disruption in printers (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003113" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-390" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.