var-201908-0705
Vulnerability from variot
Wind River VxWorks 6.6, 6.7, 6.8, 6.9.3, 6.9.4, and Vx7 has Incorrect Access Control in IPv4 assignment by the ipdhcpc DHCP client component. Wind River VxWorks Exists in a vulnerability in inserting or modifying arguments.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. The vulnerability stems from the process of constructing command parameters from external input data. The network system or product does not properly filter the special characters in the parameters. An attacker could exploit the vulnerability to execute an illegal command
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0705", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ruggedcom win7000", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "bs5.2.461.17" }, { "model": "ruggedcom win7025", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "bs5.2.461.17" }, { "model": "hirschmann hios", "scope": "lte", "trust": 1.0, "vendor": "belden", "version": "07.2.04" }, { "model": "vxworks", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "6.6" }, { "model": "vxworks", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "6.7" }, { "model": "vxworks", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "7.0" }, { "model": "hirschmann hios", "scope": "lte", "trust": 1.0, "vendor": "belden", "version": "05.3.06" }, { "model": "ruggedcom win7200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "bs5.2.461.17" }, { "model": "garrettcom magnum dx940e", "scope": "lte", "trust": 1.0, "vendor": "belden", "version": "1.0.1_y7" }, { "model": "vxworks", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "6.8" }, { "model": "vxworks", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "6.9.4" }, { "model": "hirschmann hios", "scope": "lte", "trust": 1.0, "vendor": "belden", "version": "07.5.01" }, { "model": "vxworks", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "6.9.3" }, { "model": "ruggedcom win7018", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "bs5.2.461.17" }, { "model": "hirschmann hios", "scope": "lte", "trust": 1.0, "vendor": "belden", "version": "07.0.07" }, { "model": "vxworks", "scope": "eq", "trust": 0.8, "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e", "version": "6.6" }, { "model": "vxworks", "scope": "eq", "trust": 0.8, "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e", "version": "6.9.3" }, { "model": "vxworks", "scope": "eq", "trust": 0.8, "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e", "version": "6.7" }, { "model": "vxworks", "scope": "eq", "trust": 0.8, "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e", "version": "6.8" }, { "model": "vxworks", "scope": "eq", "trust": 0.8, "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e", "version": "6.9.4" }, { "model": "vxworks", "scope": "eq", "trust": 0.8, "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "vxworks", "scope": "eq", "trust": 0.8, "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e", "version": "7" }, { "model": "river systems wind river systems vxworks", "scope": "eq", "trust": 0.6, "vendor": "wind", "version": "6.9" }, { "model": "river systems wind river systems vxworks", "scope": "eq", "trust": 0.6, "vendor": "wind", "version": "6.8" }, { "model": "river systems wind river systems vxworks", "scope": "eq", "trust": 0.6, "vendor": "wind", "version": "6.7" }, { "model": "river systems wind river systems vxworks", "scope": "eq", "trust": 0.6, "vendor": "wind", "version": "6.6" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.6" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.7" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.8" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.9.3" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.9.4" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "7" } ], "sources": [ { "db": "IVD", "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e" }, { "db": "CNVD", "id": "CNVD-2019-25706" }, { "db": "JVNDB", "id": "JVNDB-2019-007544" }, { "db": "NVD", "id": "CVE-2019-12264" } ] }, "cve": "CVE-2019-12264", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.8, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CVE-2019-12264", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CNVD-2019-25706", "impactScore": 7.8, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e", "impactScore": 7.8, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2019-12264", "impactScore": 4.2, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.1, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-12264", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-12264", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-12264", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2019-25706", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201907-1490", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e" }, { "db": "CNVD", "id": "CNVD-2019-25706" }, { "db": "JVNDB", "id": "JVNDB-2019-007544" }, { "db": "CNNVD", "id": "CNNVD-201907-1490" }, { "db": "NVD", "id": "CVE-2019-12264" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Wind River VxWorks 6.6, 6.7, 6.8, 6.9.3, 6.9.4, and Vx7 has Incorrect Access Control in IPv4 assignment by the ipdhcpc DHCP client component. Wind River VxWorks Exists in a vulnerability in inserting or modifying arguments.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. The vulnerability stems from the process of constructing command parameters from external input data. The network system or product does not properly filter the special characters in the parameters. An attacker could exploit the vulnerability to execute an illegal command", "sources": [ { "db": "NVD", "id": "CVE-2019-12264" }, { "db": "JVNDB", "id": "JVNDB-2019-007544" }, { "db": "CNVD", "id": "CNVD-2019-25706" }, { "db": "IVD", "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-12264", "trust": 4.0 }, { "db": "SIEMENS", "id": "SSA-189842", "trust": 1.6 }, { "db": "ICS CERT", "id": "ICSMA-19-274-01", "trust": 1.4 }, { "db": "ICS CERT", "id": "ICSA-19-211-01", "trust": 1.4 }, { "db": "ICS CERT", "id": "ICSA-19-274-01", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-25706", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201907-1490", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU94736763", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96242582", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-20-168-01", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-007544", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.3695.5", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3245", "trust": 0.6 }, { "db": "AUSCERT", "id": "ASB-2019.0224", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2856", "trust": 0.6 }, { "db": "IVD", "id": "099DBD8C-FA3C-4762-AAC4-226D6F6B7C0E", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e" }, { "db": "CNVD", "id": "CNVD-2019-25706" }, { "db": "JVNDB", "id": "JVNDB-2019-007544" }, { "db": "CNNVD", "id": "CNNVD-201907-1490" }, { "db": "NVD", "id": "CVE-2019-12264" } ] }, "id": "VAR-201908-0705", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e" }, { "db": "CNVD", "id": "CNVD-2019-25706" } ], "trust": 1.29719888 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e" }, { "db": "CNVD", "id": "CNVD-2019-25706" } ] }, "last_update_date": "2024-11-23T19:28:32.651000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SECURITY\u00a0VULNERABILITY\u00a0RESPONSE\u00a0INFORMATION Wind\u00a0River\u00a0Support", "trust": 0.8, "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "title": "Wind River Systems VxWorks Parameter Injection Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/172955" }, { "title": "Wind River Systems VxWorks Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95605" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25706" }, { "db": "JVNDB", "id": "JVNDB-2019-007544" }, { "db": "CNNVD", "id": "CNNVD-201907-1490" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-88", "trust": 1.0 }, { "problemtype": "Insert or change arguments (CWE-88) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-007544" }, { "db": "NVD", "id": "CVE-2019-12264" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "trust": 1.6, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "trust": 1.6, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03960en_us" }, { "trust": 1.6, "url": "https://support.f5.com/csp/article/k41190253" }, { "trust": 1.6, "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=cve-2019-12264" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12264" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-274-01" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsma-19-274-01" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-01" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu94736763/" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96242582/index.html" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-168-01" }, { "trust": 0.6, "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf" }, { "trust": 0.6, "url": "https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks" }, { "trust": 0.6, "url": "https://fortiguard.com/psirt/fg-ir-19-222" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3695.5/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2856/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/wind-river-vxworks-multiple-vulnerabilities-via-ipnet-29905" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/asb-2019.0224/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3245/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25706" }, { "db": "JVNDB", "id": "JVNDB-2019-007544" }, { "db": "CNNVD", "id": "CNNVD-201907-1490" }, { "db": "NVD", "id": "CVE-2019-12264" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e" }, { "db": "CNVD", "id": "CNVD-2019-25706" }, { "db": "JVNDB", "id": "JVNDB-2019-007544" }, { "db": "CNNVD", "id": "CNNVD-201907-1490" }, { "db": "NVD", "id": "CVE-2019-12264" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "IVD", "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e" }, { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25706" }, { "date": "2019-08-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-007544" }, { "date": "2019-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-1490" }, { "date": "2019-08-05T18:15:10.863000", "db": "NVD", "id": "CVE-2019-12264" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25706" }, { "date": "2024-09-24T06:14:00", "db": "JVNDB", "id": "JVNDB-2019-007544" }, { "date": "2021-09-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-1490" }, { "date": "2024-11-21T04:22:31.333000", "db": "NVD", "id": "CVE-2019-12264" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-1490" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Wind River Systems VxWorks Parameter injection vulnerability", "sources": [ { "db": "IVD", "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e" }, { "db": "CNVD", "id": "CNVD-2019-25706" }, { "db": "CNNVD", "id": "CNNVD-201907-1490" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Parameter injection", "sources": [ { "db": "IVD", "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e" }, { "db": "CNNVD", "id": "CNNVD-201907-1490" } ], "trust": 0.8 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.