var-201308-0090
Vulnerability from variot

The web service framework in Cisco WAAS Software 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1 in a Central Manager (CM) configuration allows remote attackers to execute arbitrary code via a crafted POST request, aka Bug ID CSCuh26626. Vendors have confirmed this vulnerability Bug ID CSCuh26626 It is released as.Skillfully crafted by a third party POST Arbitrary code may be executed via a request. Cisco Wide Area Application Services is prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. This issue is being tracked by Cisco bug ID CSCuh26626. This software is mainly used in the link environment with small bandwidth and large delay. Cisco WAAS Software 4.x, Cisco WAAS Software 5.x prior to 5.0.3e, Cisco WAAS Software 5.1.x prior to 5.1.1c, Cisco WAAS Software 5.2.x prior to 5.2.1 are affected

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201308-0090",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.1.1"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.0.23"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.0.25"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.0.19"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.1.3"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.0.27"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1.5"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.3"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1.1"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.3.3"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.4.7"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.1"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1.7"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.3.1"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.21"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.3"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.2"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.17"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.7"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.3.5"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.11"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2.3"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.13"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.4.5"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.9"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.4.1"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.1"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.5"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2.1"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.4.3"
      },
      {
        "model": "wide area application services software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.0.3e"
      },
      {
        "model": "wide area application services software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.1.1c"
      },
      {
        "model": "wide area application services software",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.2.x"
      },
      {
        "model": "wide area application services software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.2.1"
      },
      {
        "model": "wide area application services software",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.1.x"
      },
      {
        "model": "wide area application services software",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.x"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003630"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-685"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3443"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:cisco:wide_area_application_services",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003630"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco",
    "sources": [
      {
        "db": "BID",
        "id": "61542"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-685"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2013-3443",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2013-3443",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-63445",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-3443",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-3443",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201307-685",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-63445",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63445"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003630"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-685"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3443"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The web service framework in Cisco WAAS Software 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1 in a Central Manager (CM) configuration allows remote attackers to execute arbitrary code via a crafted POST request, aka Bug ID CSCuh26626. Vendors have confirmed this vulnerability Bug ID CSCuh26626 It is released as.Skillfully crafted by a third party POST Arbitrary code may be executed via a request. Cisco Wide Area Application Services is prone to a remote code-execution vulnerability. \nAttackers can exploit this issue to execute arbitrary code within the  context of the affected application. Failed exploit attempts will result  in a denial-of-service condition. \nThis issue is being tracked by Cisco bug ID CSCuh26626. This software is mainly used in the link environment with small bandwidth and large delay. Cisco WAAS Software 4.x, Cisco WAAS Software 5.x prior to 5.0.3e, Cisco WAAS Software 5.1.x prior to 5.1.1c, Cisco WAAS Software 5.2.x prior to 5.2.1 are affected",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-3443"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003630"
      },
      {
        "db": "BID",
        "id": "61542"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63445"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-3443",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "61542",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "54367",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "54372",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1028851",
        "trust": 1.1
      },
      {
        "db": "OSVDB",
        "id": "95877",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003630",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-685",
        "trust": 0.7
      },
      {
        "db": "CISCO",
        "id": "20130731 CISCO WAAS CENTRAL MANAGER REMOTE CODE EXECUTION VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-63445",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63445"
      },
      {
        "db": "BID",
        "id": "61542"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003630"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-685"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3443"
      }
    ]
  },
  "id": "VAR-201308-0090",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63445"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T14:28:02.237000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20130731-waascm",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130731-waascm"
      },
      {
        "title": "30211",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30211"
      },
      {
        "title": "cisco-sa-20130731-waascm",
        "trust": 0.8,
        "url": "http://www.cisco.com/cisco/web/support/JP/111/1119/1119242_cisco-sa-20130731-waascm-j.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003630"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63445"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003630"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3443"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/61542"
      },
      {
        "trust": 1.7,
        "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130731-waascm"
      },
      {
        "trust": 1.1,
        "url": "http://osvdb.org/95877"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1028851"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/54367"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/54372"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86121"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3443"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3443"
      },
      {
        "trust": 0.3,
        "url": "www.cisco.com"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63445"
      },
      {
        "db": "BID",
        "id": "61542"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003630"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-685"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3443"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-63445"
      },
      {
        "db": "BID",
        "id": "61542"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003630"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-685"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3443"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-08-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63445"
      },
      {
        "date": "2013-07-31T00:00:00",
        "db": "BID",
        "id": "61542"
      },
      {
        "date": "2013-08-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-003630"
      },
      {
        "date": "2013-07-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201307-685"
      },
      {
        "date": "2013-08-01T13:32:30.387000",
        "db": "NVD",
        "id": "CVE-2013-3443"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63445"
      },
      {
        "date": "2013-08-01T20:35:00",
        "db": "BID",
        "id": "61542"
      },
      {
        "date": "2013-08-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-003630"
      },
      {
        "date": "2013-08-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201307-685"
      },
      {
        "date": "2017-08-29T01:33:23.450000",
        "db": "NVD",
        "id": "CVE-2013-3443"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-685"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco WAAS Software of  Web Vulnerability to execute arbitrary code in service framework",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003630"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-685"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…