var-201905-1183
Vulnerability from variot
Insufficient input validation in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable denial of service via local access. Intel Graphics Driver Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Intel Graphics Driver is prone to multiple denial-of-service vulnerabilities. Attackers can exploit these issues to cause denial-of-service condition, denying service to legitimate users. Intel Graphics Drivers prior to 15.36.x.5067 and 15.33.x.5069 are vulnerable. KMD is one of the input modules. The vulnerability stems from the failure of the network system or product to properly validate the input data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201905-1183", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "graphics driver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "15.36.33.4578" }, { "model": "graphics driver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "15.36.31.4414" }, { "model": "graphics driver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "15.36.28.4332" }, { "model": "graphics driver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "15.36.26.4294" }, { "model": "graphics driver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "15.33.46.4885" }, { "model": "graphics driver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "15.33.43.4425" }, { "model": "graphics driver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "15.33.45.4653" }, { "model": "graphics driver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "15.36.34.4889" }, { "model": "acu wizard", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "active management technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "converged security management engine", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "driver and support assistant", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "dynamic application loader", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "i915", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc board nuc7i7dnbe", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit nuc7i5dnhe", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit nuc7i7dnhe", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit nuc7i7dnke", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit nuc8i7hnk", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit nuc8i7hvk", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "quartus ii programmer and tools", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "server platform services", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "trusted execution engine", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "intel", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "quartus prime", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "scs discovery utility", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "unite client", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "graphics driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "graphics driver", "scope": "lt", "trust": 0.8, "vendor": "intel", "version": "10.18.10.5069" }, { "model": "graphics driver", "scope": "lt", "trust": 0.8, "vendor": "intel", "version": "10.18.14.5067" }, { "model": "graphics driver", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "15.36.x.5057" }, { "model": "graphics driver", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "15.33.x.5056" }, { "model": "graphics driver", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "15.36.x.5067" }, { "model": "graphics driver", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "15.33.x.5069" } ], "sources": [ { "db": "BID", "id": "108385" }, { "db": "JVNDB", "id": "JVNDB-2019-003441" }, { "db": "JVNDB", "id": "JVNDB-2019-004715" }, { "db": "NVD", "id": "CVE-2019-0115" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:acu_wizard", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:active_management_technology_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:converged_security_management_engine_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:driver_%26_support_assistant", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:dynamic_application_loader", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:i915_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:boardnuc7i7dnbe", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc7i5dnhe", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc7i7dnhe", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc7i7dnke", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc8i7hnk", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc8i7hvk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:quartus_ii_programmer_and_tools", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:server_platform_services_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:trusted_execution_engine_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:quartus_prime", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:scs_discovery_utility", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:Unite_Client", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:graphics_driver", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003441" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Konstantin Wurster, and an Intel partner.", "sources": [ { "db": "BID", "id": "108385" }, { "db": "CNNVD", "id": "CNNVD-201905-755" } ], "trust": 0.9 }, "cve": "CVE-2019-0115", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-0115", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-140146", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2019-0115", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-0115", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-0115", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201905-755", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-140146", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140146" }, { "db": "JVNDB", "id": "JVNDB-2019-004715" }, { "db": "CNNVD", "id": "CNNVD-201905-755" }, { "db": "NVD", "id": "CVE-2019-0115" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient input validation in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable denial of service via local access. Intel Graphics Driver Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Intel Graphics Driver is prone to multiple denial-of-service vulnerabilities. \nAttackers can exploit these issues to cause denial-of-service condition, denying service to legitimate users. \nIntel Graphics Drivers prior to 15.36.x.5067 and 15.33.x.5069 are vulnerable. KMD is one of the input modules. The vulnerability stems from the failure of the network system or product to properly validate the input data", "sources": [ { "db": "NVD", "id": "CVE-2019-0115" }, { "db": "JVNDB", "id": "JVNDB-2019-004715" }, { "db": "BID", "id": "108385" }, { "db": "VULHUB", "id": "VHN-140146" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0115", "trust": 2.8 }, { "db": "BID", "id": "108385", "trust": 2.0 }, { "db": "JVN", "id": "JVNVU92328381", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2019-003441", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2019-004715", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201905-755", "trust": 0.7 }, { "db": "LENOVO", "id": "LEN-26295", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-140146", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140146" }, { "db": "BID", "id": "108385" }, { "db": "JVNDB", "id": "JVNDB-2019-003441" }, { "db": "JVNDB", "id": "JVNDB-2019-004715" }, { "db": "CNNVD", "id": "CNNVD-201905-755" }, { "db": "NVD", "id": "CVE-2019-0115" } ] }, "id": "VAR-201905-1183", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140146" } ], "trust": 0.773523948 }, "last_update_date": "2024-11-23T19:59:24.849000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-SA-00234 - IntelR SCS Discovery Utility and IntelR ACU Wizard Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00234.html" }, { "title": "INTEL-SA-00244 - IntelR QuartusR Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00244.html" }, { "title": "INTEL-SA-00245 - Intel UniteR Client for Android* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00245.html" }, { "title": "INTEL-SA-00204 - Intel IntelR PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00204.html" }, { "title": "INTEL-SA-00249 - IntelR i915 Graphics for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00249.html" }, { "title": "INTEL-SA-00213 - IntelR CSME, IntelR SPS, IntelR TXE, IntelR DAL, and IntelR AMT 2019.1 QSR Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "title": "INTEL-SA-00251 - IntelR NUC Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00251.html" }, { "title": "INTEL-SA-00218 - IntelR Graphics Driver for Windows* 2019.1 QSR Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00218.html" }, { "title": "INTEL-SA-00252 - IntelR Driver \u0026 Support Assistant Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00252.html" }, { "title": "INTEL-SA-00223 - Intel 2019.1 QSR UEFI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00223.html" }, { "title": "INTEL-SA-00228 - Intel UniteR Client Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00228.html" }, { "title": "INTEL-SA-00233 - Microarchitectural Data Sampling Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html" }, { "title": "INTEL-SA-00218", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003441" }, { "db": "JVNDB", "id": "JVNDB-2019-004715" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140146" }, { "db": "JVNDB", "id": "JVNDB-2019-004715" }, { "db": "NVD", "id": "CVE-2019-0115" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/108385" }, { "trust": 2.0, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00218.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0115" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92328381/index.html" }, { "trust": 0.8, "url": "https://mdsattacks.com/files/ridl.pdf" }, { "trust": 0.8, "url": "https://mdsattacks.com/files/fallout.pdf" }, { "trust": 0.8, "url": "https://zombieloadattack.com/" }, { "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0115" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92328381/" }, { "trust": 0.8, "url": "https://jvndb.jvn.jp/ja/contents/2019/jvndb-2019-003441.html" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/product_security/len-26295" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140146" }, { "db": "BID", "id": "108385" }, { "db": "JVNDB", "id": "JVNDB-2019-003441" }, { "db": "JVNDB", "id": "JVNDB-2019-004715" }, { "db": "CNNVD", "id": "CNNVD-201905-755" }, { "db": "NVD", "id": "CVE-2019-0115" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140146" }, { "db": "BID", "id": "108385" }, { "db": "JVNDB", "id": "JVNDB-2019-003441" }, { "db": "JVNDB", "id": "JVNDB-2019-004715" }, { "db": "CNNVD", "id": "CNNVD-201905-755" }, { "db": "NVD", "id": "CVE-2019-0115" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-05-17T00:00:00", "db": "VULHUB", "id": "VHN-140146" }, { "date": "2019-05-14T00:00:00", "db": "BID", "id": "108385" }, { "date": "2019-05-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003441" }, { "date": "2019-06-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004715" }, { "date": "2019-05-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201905-755" }, { "date": "2019-05-17T16:29:01.673000", "db": "NVD", "id": "CVE-2019-0115" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-05-21T00:00:00", "db": "VULHUB", "id": "VHN-140146" }, { "date": "2019-05-14T00:00:00", "db": "BID", "id": "108385" }, { "date": "2019-05-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003441" }, { "date": "2019-06-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004715" }, { "date": "2019-08-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201905-755" }, { "date": "2024-11-21T04:16:15.500000", "db": "NVD", "id": "CVE-2019-0115" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108385" }, { "db": "CNNVD", "id": "CNNVD-201905-755" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003441" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201905-755" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.