var-201702-0309
Vulnerability from variot
EMC Data Protection Advisor 6.1.x, EMC Data Protection Advisor 6.2, EMC Data Protection Advisor 6.2.1, EMC Data Protection Advisor 6.2.2, EMC Data Protection Advisor 6.2.3 prior to patch 446 has a path traversal vulnerability that may potentially be exploited by malicious users to compromise the affected system. Authentication is not required to exploit this vulnerability.The specific flaw exists within the ImageServlet servlet which listens on TCP ports 9002 and 9004. The issue lies in the failure to properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose files under the context of SYSTEM. The solution enables the automation and centralization of all such data collection and analysis, obtaining a single comprehensive view of the data protection environment and activities, and more.
Link to remedies: Registered EMC Online Support customers can download the required patch from support.emc.com at https://support.emc.com/downloads/829_Data-Protection-Advisor
If you have any questions, contact DELL/EMC Support.
Credits: EMC would like to thank rgod working with Trend Micro's Zero Day Initiative for reporting this vulnerability.
Read and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867.
For an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.
EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQEcBAEBCAAGBQJYiiHdAAoJEHbcu+fsE81ZK0MH/3ClnyYIsR4ztTld+TCIzWO1 ber0FmYs7iRUyiU6XPVxoOYvEQTTmZRwFzdKwXNQMwxwUc2TQoJy2Bqkf8OrMbB/ yA4sJkyCFD6pkX14Rp6RvOFYK+4MtkbLQkmyIyi4bpM19U33XIfojBH28zmFvQlG Tzj8wUkXP+/BLLz4c80Ffs9G4JbueBgCc24CVjVN8Ygh2ykAQLAyahfsw5nC3LZO qQdOo3yV6qn4OSHBqg6nLkFJXhvuUxl+OFm1C/Rl1xdIJ21tG54nKyxswQFr9M7+ MuvHCmooXSUNOtiznS/9cBRg5hKcB5Ug/OdWe3SzrP0D0sWekcsrGClUpES1EgI= =CMLs -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0309", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emc data protection advisor", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "6.2.2" }, { "model": "emc data protection advisor", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "6.1" }, { "model": "emc data protection advisor", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "6.2" }, { "model": "emc data protection advisor", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "6.2.3" }, { "model": "emc data protection advisor", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "6.2.1" }, { "model": "data protection advisor", "scope": "eq", "trust": 0.9, "vendor": "emc", "version": "6.2.3" }, { "model": "data protection advisor", "scope": "eq", "trust": 0.9, "vendor": "emc", "version": "6.2.2" }, { "model": "data protection advisor", "scope": "eq", "trust": 0.9, "vendor": "emc", "version": "6.2.1" }, { "model": "data protection advisor", "scope": "eq", "trust": 0.9, "vendor": "emc", "version": "6.1" }, { "model": "data protection advisor", "scope": "eq", "trust": 0.9, "vendor": "emc", "version": "6.2" }, { "model": "data protection advisor", "scope": "eq", "trust": 0.8, "vendor": "dell emc old emc", "version": "6.2.1" }, { "model": "data protection advisor", "scope": "eq", "trust": 0.8, "vendor": "dell emc old emc", "version": "6.1.x" }, { "model": "data protection advisor", "scope": "eq", "trust": 0.8, "vendor": "dell emc old emc", "version": "6.2" }, { "model": "data protection advisor", "scope": "eq", "trust": 0.8, "vendor": "dell emc old emc", "version": "6.2.2" }, { "model": "data protection advisor", "scope": "lt", "trust": 0.8, "vendor": "dell emc old emc", "version": "6.2.3" }, { "model": "data protection advisor", "scope": "eq", "trust": 0.8, "vendor": "dell emc old emc", "version": "6.2.3 patch 446" }, { "model": "data protection advisor", "scope": null, "trust": 0.7, "vendor": "emc", "version": null }, { "model": "data protection advisor patch", "scope": "ne", "trust": 0.3, "vendor": "emc", "version": "6.2.3446" } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-394" }, { "db": "BID", "id": "95833" }, { "db": "JVNDB", "id": "JVNDB-2016-007968" }, { "db": "CNNVD", "id": "CNNVD-201702-031" }, { "db": "NVD", "id": "CVE-2016-8211" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:emc:data_protection_advisor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007968" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-17-394" } ], "trust": 0.7 }, "cve": "CVE-2016-8211", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-8211", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 2.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-97031", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-8211", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-8211", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-8211", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-8211", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2016-8211", "trust": 0.7, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201702-031", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-97031", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-394" }, { "db": "VULHUB", "id": "VHN-97031" }, { "db": "JVNDB", "id": "JVNDB-2016-007968" }, { "db": "CNNVD", "id": "CNNVD-201702-031" }, { "db": "NVD", "id": "CVE-2016-8211" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMC Data Protection Advisor 6.1.x, EMC Data Protection Advisor 6.2, EMC Data Protection Advisor 6.2.1, EMC Data Protection Advisor 6.2.2, EMC Data Protection Advisor 6.2.3 prior to patch 446 has a path traversal vulnerability that may potentially be exploited by malicious users to compromise the affected system. Authentication is not required to exploit this vulnerability.The specific flaw exists within the ImageServlet servlet which listens on TCP ports 9002 and 9004. The issue lies in the failure to properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose files under the context of SYSTEM. The solution enables the automation and centralization of all such data collection and analysis, obtaining a single comprehensive view of the data protection environment and activities, and more. \n\n\nLink to remedies:\nRegistered EMC Online Support customers can download the required patch from support.emc.com at https://support.emc.com/downloads/829_Data-Protection-Advisor\n\nIf you have any questions, contact DELL/EMC Support. \n\nCredits:\nEMC would like to thank rgod working with Trend Micro\u0027s Zero Day Initiative for reporting this vulnerability. \n\n\nRead and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867. \n\nFor an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. \n\nEMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided \"as is\" without warranty of any kind. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2\n\niQEcBAEBCAAGBQJYiiHdAAoJEHbcu+fsE81ZK0MH/3ClnyYIsR4ztTld+TCIzWO1\nber0FmYs7iRUyiU6XPVxoOYvEQTTmZRwFzdKwXNQMwxwUc2TQoJy2Bqkf8OrMbB/\nyA4sJkyCFD6pkX14Rp6RvOFYK+4MtkbLQkmyIyi4bpM19U33XIfojBH28zmFvQlG\nTzj8wUkXP+/BLLz4c80Ffs9G4JbueBgCc24CVjVN8Ygh2ykAQLAyahfsw5nC3LZO\nqQdOo3yV6qn4OSHBqg6nLkFJXhvuUxl+OFm1C/Rl1xdIJ21tG54nKyxswQFr9M7+\nMuvHCmooXSUNOtiznS/9cBRg5hKcB5Ug/OdWe3SzrP0D0sWekcsrGClUpES1EgI=\n=CMLs\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2016-8211" }, { "db": "JVNDB", "id": "JVNDB-2016-007968" }, { "db": "ZDI", "id": "ZDI-17-394" }, { "db": "BID", "id": "95833" }, { "db": "VULHUB", "id": "VHN-97031" }, { "db": "PACKETSTORM", "id": "140788" } ], "trust": 2.7 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-97031", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-97031" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-8211", "trust": 3.6 }, { "db": "BID", "id": "95833", "trust": 1.4 }, { "db": "SECTRACK", "id": "1037729", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-007968", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3844", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-17-394", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201702-031", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "140788", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-97031", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-394" }, { "db": "VULHUB", "id": "VHN-97031" }, { "db": "BID", "id": "95833" }, { "db": "JVNDB", "id": "JVNDB-2016-007968" }, { "db": "PACKETSTORM", "id": "140788" }, { "db": "CNNVD", "id": "CNNVD-201702-031" }, { "db": "NVD", "id": "CVE-2016-8211" } ] }, "id": "VAR-201702-0309", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-97031" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:42:17.762000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EMC Data Protection Advisor", "trust": 0.8, "url": "https://japan.emc.com/data-protection/data-protection-advisor.htm" }, { "title": "EMC has issued an update to correct this vulnerability.", "trust": 0.7, "url": "http://seclists.org/bugtraq/2017/Jan/att-87/ESA-2016-133.txt" }, { "title": "EMC Data Protection Advisor Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=67419" } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-394" }, { "db": "JVNDB", "id": "JVNDB-2016-007968" }, { "db": "CNNVD", "id": "CNNVD-201702-031" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-97031" }, { "db": "JVNDB", "id": "JVNDB-2016-007968" }, { "db": "NVD", "id": "CVE-2016-8211" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/archive/1/540067/30/0/threaded" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/95833" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037729" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8211" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8211" }, { "trust": 0.7, "url": "http://seclists.org/bugtraq/2017/jan/att-87/esa-2016-133.txt" }, { "trust": 0.3, "url": "http://www.emc.com/" }, { "trust": 0.1, "url": "https://support.emc.com/downloads/829_data-protection-advisor" } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-394" }, { "db": "VULHUB", "id": "VHN-97031" }, { "db": "BID", "id": "95833" }, { "db": "JVNDB", "id": "JVNDB-2016-007968" }, { "db": "PACKETSTORM", "id": "140788" }, { "db": "CNNVD", "id": "CNNVD-201702-031" }, { "db": "NVD", "id": "CVE-2016-8211" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-17-394" }, { "db": "VULHUB", "id": "VHN-97031" }, { "db": "BID", "id": "95833" }, { "db": "JVNDB", "id": "JVNDB-2016-007968" }, { "db": "PACKETSTORM", "id": "140788" }, { "db": "CNNVD", "id": "CNNVD-201702-031" }, { "db": "NVD", "id": "CVE-2016-8211" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-06-12T00:00:00", "db": "ZDI", "id": "ZDI-17-394" }, { "date": "2017-02-03T00:00:00", "db": "VULHUB", "id": "VHN-97031" }, { "date": "2017-01-25T00:00:00", "db": "BID", "id": "95833" }, { "date": "2017-04-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007968" }, { "date": "2017-01-28T10:21:11", "db": "PACKETSTORM", "id": "140788" }, { "date": "2017-02-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201702-031" }, { "date": "2017-02-03T07:59:00.327000", "db": "NVD", "id": "CVE-2016-8211" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-06-12T00:00:00", "db": "ZDI", "id": "ZDI-17-394" }, { "date": "2020-01-23T00:00:00", "db": "VULHUB", "id": "VHN-97031" }, { "date": "2017-02-02T01:03:00", "db": "BID", "id": "95833" }, { "date": "2017-04-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007968" }, { "date": "2017-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201702-031" }, { "date": "2024-11-21T02:58:59.730000", "db": "NVD", "id": "CVE-2016-8211" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201702-031" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMC Data Protection Advisor Path traversal vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007968" }, { "db": "CNNVD", "id": "CNNVD-201702-031" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-201702-031" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.