CVE-2014-7997
Vulnerability from cvelistv5
Published
2014-11-15 02:00
Modified
2024-08-06 13:03
Severity ?
Summary
The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:03:27.650Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-aironet-cve20147997-dos(98691)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691"
          },
          {
            "name": "1031218",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1031218"
          },
          {
            "name": "20141114 Cisco Aironet DHCP Denial of Service Vulnerabilty",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-11-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-07T15:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-aironet-cve20147997-dos(98691)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691"
        },
        {
          "name": "1031218",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1031218"
        },
        {
          "name": "20141114 Cisco Aironet DHCP Denial of Service Vulnerabilty",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-7997",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "cisco-aironet-cve20147997-dos(98691)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691"
            },
            {
              "name": "1031218",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1031218"
            },
            {
              "name": "20141114 Cisco Aironet DHCP Denial of Service Vulnerabilty",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-7997",
    "datePublished": "2014-11-15T02:00:00",
    "dateReserved": "2014-10-08T00:00:00",
    "dateUpdated": "2024-08-06T13:03:27.650Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6230A85-30D2-4934-A8A0-11499B7B09F8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1040:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7361553C-439A-4EFC-B47C-5D099132A9BD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1140:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42E54595-DEA2-4CDA-B218-89B034EB129F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1260:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"900C8376-9891-4CAF-8873-1CE78CFEB050\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_3500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D385DFB0-FE3D-4217-B17A-1AB4A34363AA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_3600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86AFB6B7-F5A5-4F87-A149-53FC82D5D863\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_3600e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35E201F1-02D0-4023-9A50-3D8F1A9EC357\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_3600i:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65CBE08A-4F2B-452D-B3B3-034DE13E86CF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_3600p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CE92197-190B-466A-B7A7-268051DA4395\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_600_office_extend:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"903A79E0-184A-4CFB-96FA-A3E0474503FD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap1130ag:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D56D069-0E19-4E60-A30A-23C27964B674\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap1131:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA740581-ED86-4822-9516-BCCA4C267561\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E8B5553-7295-4786-9F81-B4527EAD4F0B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap1230ag:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01A48851-D4D5-4ABC-A44A-F82A97882C45\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap1240:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AAA8DE4-4E1D-4286-846D-0381BF68632F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap1240ag:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17BBE092-4156-45E8-A7ED-55C2765580CC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap1300:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F02967F7-FC29-460E-A07E-99397E55A63F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap1400:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D84F4CEF-F599-48EE-A5FA-252880332A84\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap340:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DBDCD08-D3E9-4E72-BC5E-A9A9453D32A8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap340:11.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E8F1355-5A18-4692-B54C-083291E751E3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap350:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AF8AA1B-17C3-49E3-BA0F-17FFCE2AAE03\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap350:11.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97943532-2C6A-4867-BD40-1B848BD2009A\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281.\"}, {\"lang\": \"es\", \"value\": \"La implementaci\\u00f3n DHCP en Cisco IOS en puntos de acceso Aironet no maneja debidamente las condiciones de error con concesiones cortas ni los intentos de renovaci\\u00f3n de concesi\\u00f3n sin \\u00e9xito, lo que permite a atacantes remotos causar una denegaci\\u00f3n de servicio (reinicio del dispositivo) mediante la activaci\\u00f3n de una transici\\u00f3n a un estado de recuperaci\\u00f3n con la intenci\\u00f3n de provocar un reinicio de la interfaz de red, pero en realidad implica un reinicio completo del dispositivo, tambi\\u00e9n conocido como Bug ID CSCtn16281.\"}]",
      "id": "CVE-2014-7997",
      "lastModified": "2024-11-21T02:18:24.057",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:A/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 6.1, \"accessVector\": \"ADJACENT_NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 6.5, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2014-11-15T02:59:01.517",
      "references": "[{\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1031218\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/98691\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1031218\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/98691\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2014-7997\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2014-11-15T02:59:01.517\",\"lastModified\":\"2024-11-21T02:18:24.057\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281.\"},{\"lang\":\"es\",\"value\":\"La implementaci\u00f3n DHCP en Cisco IOS en puntos de acceso Aironet no maneja debidamente las condiciones de error con concesiones cortas ni los intentos de renovaci\u00f3n de concesi\u00f3n sin \u00e9xito, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio del dispositivo) mediante la activaci\u00f3n de una transici\u00f3n a un estado de recuperaci\u00f3n con la intenci\u00f3n de provocar un reinicio de la interfaz de red, pero en realidad implica un reinicio completo del dispositivo, tambi\u00e9n conocido como Bug ID CSCtn16281.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":6.1,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.5,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6230A85-30D2-4934-A8A0-11499B7B09F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1040:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7361553C-439A-4EFC-B47C-5D099132A9BD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42E54595-DEA2-4CDA-B218-89B034EB129F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900C8376-9891-4CAF-8873-1CE78CFEB050\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_3500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D385DFB0-FE3D-4217-B17A-1AB4A34363AA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_3600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86AFB6B7-F5A5-4F87-A149-53FC82D5D863\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_3600e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35E201F1-02D0-4023-9A50-3D8F1A9EC357\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_3600i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65CBE08A-4F2B-452D-B3B3-034DE13E86CF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_3600p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CE92197-190B-466A-B7A7-268051DA4395\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_600_office_extend:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"903A79E0-184A-4CFB-96FA-A3E0474503FD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1130ag:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D56D069-0E19-4E60-A30A-23C27964B674\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1131:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA740581-ED86-4822-9516-BCCA4C267561\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E8B5553-7295-4786-9F81-B4527EAD4F0B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1230ag:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01A48851-D4D5-4ABC-A44A-F82A97882C45\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1240:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AAA8DE4-4E1D-4286-846D-0381BF68632F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1240ag:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17BBE092-4156-45E8-A7ED-55C2765580CC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1300:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F02967F7-FC29-460E-A07E-99397E55A63F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1400:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D84F4CEF-F599-48EE-A5FA-252880332A84\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap340:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DBDCD08-D3E9-4E72-BC5E-A9A9453D32A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap340:11.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8F1355-5A18-4692-B54C-083291E751E3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap350:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AF8AA1B-17C3-49E3-BA0F-17FFCE2AAE03\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap350:11.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97943532-2C6A-4867-BD40-1B848BD2009A\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1031218\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/98691\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1031218\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/98691\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.