var-201504-0081
Vulnerability from variot

The XPC implementation in Admin Framework in Apple OS X before 10.10.3 allows local users to bypass authentication and obtain admin privileges via unspecified vectors. Supplementary information : CWE Vulnerability type by CWE-254: Security Features ( Security function ) Has been identified. http://cwe.mitre.org/data/definitions/254.htmlAuthentication bypassed by local users, and admin You may get permission. The update addresses new vulnerabilities that affect the Admin Framework, ATS, CoreAnimation, Graphics Driver, Hypervisor, ImageIO, IOHIDFamily, Kernel, LaunchServices, UniformTypeIdentifiers, Security - Code Signing, Open Directory Client, and Screen Sharing components. Attackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information and perform other attacks. These issues affect Mac OS X prior to 10.10.3

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201504-0081",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mac os x",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.10.2"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "10.10 to  10.10.2"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "10.10.2"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002163"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-155"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-1130"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002163"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple, Emil Kvarnhammar at TrueSec, Ian Beer of Google Project Zero, Frank Graziano and John Villamil of the Yahoo Pentest Team, Izik Eidus and Alex Fishman, lokihardt@ASRT working with HP\u0027s Zero Day Initiative, Luca Todesco, and Ole Andre Vadla Ravnas of",
    "sources": [
      {
        "db": "BID",
        "id": "73982"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-1130",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2015-1130",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-79090",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-1130",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2015-1130",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201504-155",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-79090",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2015-1130",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-79090"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-1130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002163"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-155"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-1130"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The XPC implementation in Admin Framework in Apple OS X before 10.10.3 allows local users to bypass authentication and obtain admin privileges via unspecified vectors. Supplementary information : CWE Vulnerability type by CWE-254: Security Features ( Security function ) Has been identified. http://cwe.mitre.org/data/definitions/254.htmlAuthentication bypassed by local users, and admin You may get permission. \nThe update addresses new vulnerabilities that affect the Admin Framework, ATS, CoreAnimation, Graphics Driver, Hypervisor, ImageIO, IOHIDFamily, Kernel, LaunchServices, UniformTypeIdentifiers, Security - Code Signing, Open Directory Client, and Screen Sharing components. \nAttackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information and perform other attacks. \nThese issues affect Mac OS X prior to 10.10.3",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-1130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002163"
      },
      {
        "db": "BID",
        "id": "73982"
      },
      {
        "db": "VULHUB",
        "id": "VHN-79090"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-1130"
      }
    ],
    "trust": 2.07
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=36692",
        "trust": 0.2,
        "type": "exploit"
      },
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-79090",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-79090"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-1130"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-1130",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "73982",
        "trust": 1.5
      },
      {
        "db": "SECTRACK",
        "id": "1032048",
        "trust": 1.2
      },
      {
        "db": "OSVDB",
        "id": "120418",
        "trust": 1.2
      },
      {
        "db": "EXPLOIT-DB",
        "id": "36692",
        "trust": 1.2
      },
      {
        "db": "JVN",
        "id": "JVNVU91828320",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002163",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-155",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-121",
        "trust": 0.3
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-165",
        "trust": 0.3
      },
      {
        "db": "PACKETSTORM",
        "id": "131381",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "131368",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-89389",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "36745",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-79090",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-1130",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-79090"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-1130"
      },
      {
        "db": "BID",
        "id": "73982"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002163"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-155"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-1130"
      }
    ]
  },
  "id": "VAR-201504-0081",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-79090"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T19:27:35.641000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "APPLE-SA-2015-04-08-2 OS X 10.10.3 and Security Update 2015-004",
        "trust": 0.8,
        "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
      },
      {
        "title": "HT204659",
        "trust": 0.8,
        "url": "http://support.apple.com/en-us/HT204659"
      },
      {
        "title": "HT204659",
        "trust": 0.8,
        "url": "http://support.apple.com/ja-jp/HT204659"
      },
      {
        "title": "OSXUpd10.10.3",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54848"
      },
      {
        "title": "iPhone7,1_8.3_12F70_Restore",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54847"
      },
      {
        "title": "AppleTV3,2_7.2_12F69_Restore",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54849"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2015/05/07/mac_malware/"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2015/04/10/hacker_digs_up_os_x_root_backdoor/"
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/MrE-Fog/RootPipe-Demo "
      },
      {
        "title": "rootpipo",
        "trust": 0.1,
        "url": "https://github.com/melomac/rootpipo "
      },
      {
        "title": "RootPipe-Demo",
        "trust": 0.1,
        "url": "https://github.com/Shmoopi/RootPipe-Demo "
      },
      {
        "title": "suid_scan",
        "trust": 0.1,
        "url": "https://github.com/univ-of-utah-marriott-library-apple/suid_scan "
      },
      {
        "title": "RootPipeTester",
        "trust": 0.1,
        "url": "https://github.com/sideeffect42/RootPipeTester "
      },
      {
        "title": "source_code_analyzer",
        "trust": 0.1,
        "url": "https://github.com/svartkanin/source_code_analyzer "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2015-1130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002163"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-155"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-254",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-79090"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002163"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-1130"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "http://lists.apple.com/archives/security-announce/2015/apr/msg00001.html"
      },
      {
        "trust": 1.8,
        "url": "https://support.apple.com/ht204659"
      },
      {
        "trust": 1.3,
        "url": "http://www.securityfocus.com/bid/73982"
      },
      {
        "trust": 1.3,
        "url": "https://www.exploit-db.com/exploits/36692/"
      },
      {
        "trust": 1.2,
        "url": "http://www.osvdb.org/120418"
      },
      {
        "trust": 1.2,
        "url": "http://www.securitytracker.com/id/1032048"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1130"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu91828320/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1130"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/macosx/"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-us/ht204659"
      },
      {
        "trust": 0.3,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-15-165/"
      },
      {
        "trust": 0.3,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-15-121/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/254.html"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/mre-fog/rootpipe-demo"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/melomac/rootpipo"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-79090"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-1130"
      },
      {
        "db": "BID",
        "id": "73982"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002163"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-155"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-1130"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-79090"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-1130"
      },
      {
        "db": "BID",
        "id": "73982"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002163"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-155"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-1130"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-04-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-79090"
      },
      {
        "date": "2015-04-10T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-1130"
      },
      {
        "date": "2015-04-08T00:00:00",
        "db": "BID",
        "id": "73982"
      },
      {
        "date": "2015-04-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-002163"
      },
      {
        "date": "2015-04-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201504-155"
      },
      {
        "date": "2015-04-10T14:59:43.073000",
        "db": "NVD",
        "id": "CVE-2015-1130"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-09-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-79090"
      },
      {
        "date": "2015-09-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-1130"
      },
      {
        "date": "2015-05-12T19:47:00",
        "db": "BID",
        "id": "73982"
      },
      {
        "date": "2015-04-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-002163"
      },
      {
        "date": "2015-04-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201504-155"
      },
      {
        "date": "2024-11-21T02:24:44.383000",
        "db": "NVD",
        "id": "CVE-2015-1130"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-155"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple OS X of  Admin Framework of  XPC Vulnerabilities that prevent authentication from being implemented",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002163"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "73982"
      }
    ],
    "trust": 0.3
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…