var-201708-1353
Vulnerability from variot

A vulnerability in the cache server within Cisco Videoscape Distribution Suite (VDS) for Television 3.2(5)ES1 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted appliance. The vulnerability is due to excessive mapped connections exhausting the allotted resources within the system. An attacker could exploit this vulnerability by sending large amounts of inbound traffic to a device with the intention of overloading certain resources. A successful exploit could cause the device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc39260. Cisco Videoscape Distribution Suite (VDS) for Television Contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvc39260 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. The solution supports streaming media live broadcast, dynamic acquisition of content library and content caching, etc. cache server is one of the cache servers

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201708-1353",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.2\\(1\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.4\\(2\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.2\\(5\\)es1"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.8\\(1\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.4\\(1\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.6\\(1\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.5\\(1\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.1\\(3\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.4\\(1\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.1\\(4\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.3\\(1\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1\\(2\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.2\\(7\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.9\\(1\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1\\(5\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.5\\(1\\)-cos"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.2\\(6\\)"
      },
      {
        "model": "videoscape distribution suite for television",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "videoscape distribution suite for television 3.2 es1",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "tv streamer application",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "tv streamer application",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.6(1)"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "100106"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-006806"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-137"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6745"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:cisco:videoscape_distribution_suite_for_television",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-006806"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco",
    "sources": [
      {
        "db": "BID",
        "id": "100106"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-137"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2017-6745",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-6745",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-114948",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-6745",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-6745",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-6745",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201708-137",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-114948",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-6745",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-114948"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-6745"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-006806"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-137"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6745"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A vulnerability in the cache server within Cisco Videoscape Distribution Suite (VDS) for Television 3.2(5)ES1 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted appliance. The vulnerability is due to excessive mapped connections exhausting the allotted resources within the system. An attacker could exploit this vulnerability by sending large amounts of inbound traffic to a device with the intention of overloading certain resources. A successful exploit could cause the device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc39260. Cisco Videoscape Distribution Suite (VDS) for Television Contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvc39260 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. The solution supports streaming media live broadcast, dynamic acquisition of content library and content caching, etc. cache server is one of the cache servers",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-6745"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-006806"
      },
      {
        "db": "BID",
        "id": "100106"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114948"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-6745"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-6745",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "100106",
        "trust": 2.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-006806",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-137",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2017.1179.2",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-114948",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-6745",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-114948"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-6745"
      },
      {
        "db": "BID",
        "id": "100106"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-006806"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-137"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6745"
      }
    ]
  },
  "id": "VAR-201708-1353",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-114948"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T20:17:06.887000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20170802-vds",
        "trust": 0.8,
        "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-vds"
      },
      {
        "title": "Cisco Videoscape Distribution Suite for Television cache server Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=72379"
      },
      {
        "title": "Cisco: Cisco Videoscape Distribution Suite Cache Server Denial of Service Vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20170802-vds"
      },
      {
        "title": "Symantec Security Advisories: SA148: Linux Kernel Vulnerabilities Feb-Apr 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=f0d00b7af116794375aefb8b1a967bc5"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2017-6745"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-006806"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-137"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-114948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-006806"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6745"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170802-vds"
      },
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/100106"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6745"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6745"
      },
      {
        "trust": 0.6,
        "url": "https://bto.bluecoat.com/security-advisory/sa148"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2017.1179.2/"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/119.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-114948"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-6745"
      },
      {
        "db": "BID",
        "id": "100106"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-006806"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-137"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6745"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-114948"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-6745"
      },
      {
        "db": "BID",
        "id": "100106"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-006806"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-137"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6745"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-114948"
      },
      {
        "date": "2017-08-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-6745"
      },
      {
        "date": "2017-08-02T00:00:00",
        "db": "BID",
        "id": "100106"
      },
      {
        "date": "2017-09-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-006806"
      },
      {
        "date": "2017-08-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201708-137"
      },
      {
        "date": "2017-08-07T06:29:00.323000",
        "db": "NVD",
        "id": "CVE-2017-6745"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-114948"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-6745"
      },
      {
        "date": "2017-08-02T00:00:00",
        "db": "BID",
        "id": "100106"
      },
      {
        "date": "2017-09-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-006806"
      },
      {
        "date": "2020-02-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201708-137"
      },
      {
        "date": "2024-11-21T03:30:26.103000",
        "db": "NVD",
        "id": "CVE-2017-6745"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-137"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Videoscape Distribution Suite for Television Buffer error vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-006806"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-137"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…