CVE-2019-11684 (GCVE-0-2019-11684)
Vulnerability from cvelistv5 – Published: 2021-02-26 15:05 – Updated: 2024-09-17 01:22
VLAI?
Summary
Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 < v3.71.0034 and v3.81 < 3.81.0050; DIVAR IP 5000 3.80 < 3.80.0039; BVMS all versions using VRM.
Severity ?
9.9 (Critical)
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T23:03:32.223Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://psirt.bosch.com/security-advisories/bosch-sa-804652.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2019-05-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 \u003c v3.71.0034 and v3.81 \u003c 3.81.0050; DIVAR IP 5000 3.80 \u003c 3.80.0039; BVMS all versions using VRM."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-02-26T15:05:45",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://psirt.bosch.com/security-advisories/bosch-sa-804652.html"
}
],
"source": {
"advisory": "BOSCH-SA-804652-BT",
"discovery": "INTERNAL"
},
"title": "Improper Access Control in Bosch Video Recording Manager",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"DATE_PUBLIC": "2019-05-09",
"ID": "CVE-2019-11684",
"STATE": "PUBLIC",
"TITLE": "Improper Access Control in Bosch Video Recording Manager"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 \u003c v3.71.0034 and v3.81 \u003c 3.81.0050; DIVAR IP 5000 3.80 \u003c 3.80.0039; BVMS all versions using VRM."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://psirt.bosch.com/security-advisories/bosch-sa-804652.html",
"refsource": "CONFIRM",
"url": "https://psirt.bosch.com/security-advisories/bosch-sa-804652.html"
}
]
},
"source": {
"advisory": "BOSCH-SA-804652-BT",
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-11684",
"datePublished": "2021-02-26T15:05:45.533535Z",
"dateReserved": "2019-05-02T00:00:00",
"dateUpdated": "2024-09-17T01:22:05.355Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.70\", \"versionEndExcluding\": \"3.71.0034\", \"matchCriteriaId\": \"3BF60397-29D1-4764-913F-96F07DE1A403\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.81\", \"versionEndExcluding\": \"3.81.0050\", \"matchCriteriaId\": \"B3E94AB7-ABC6-4B3C-97A9-78A8495E793A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.80\", \"versionEndExcluding\": \"3.80.0039\", \"matchCriteriaId\": \"8D5204C5-A853-408E-A7DA-8312056693F7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB0DE1C9-D3C0-49BF-9FFD-B765F9AF6691\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bosch:video_management_system:3.70.0056:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"230D1A5C-D2B1-48E9-A9A1-EDE65491B715\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bosch:video_management_system:3.70.0058:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60BD9A29-1D4C-44AC-8169-DCDABD21424E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bosch:video_management_system:3.70.0060:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EB8AC9A-7802-4D29-BA8A-FB2E300F3CF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bosch:video_management_system:3.70.0062:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BE9BAD2-B925-4507-805D-0006850CF815\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bosch:video_management_system:3.71.0022:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B53DABF-8D3C-4470-A981-12363D230938\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bosch:video_management_system:3.71.0029:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68F65CA5-9032-4DF3-8FA5-122B571DC4A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bosch:video_management_system:3.71.0031:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"800E0CBC-591B-4EDC-9E3D-633AD3921F5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bosch:video_management_system:3.71.0032:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"327610AC-25F3-4017-9F19-EA13CAE9EC1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bosch:video_management_system:3.81.0032:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AD6ED4A-EAE2-4AD6-AF48-A6383B9F8257\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bosch:video_management_system:3.81.0038:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8514A9F2-D0AC-4AD4-878C-C1E21D2029E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bosch:video_management_system:3.81.0048:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4677B06D-B4A9-4892-B735-71FE614E51FD\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 \u003c v3.71.0034 and v3.81 \u003c 3.81.0050; DIVAR IP 5000 3.80 \u003c 3.80.0039; BVMS all versions using VRM.\"}, {\"lang\": \"es\", \"value\": \"Un control de acceso inapropiado en el servidor RCP+ del componente Bosch Video Recording Manager (VRM), permite el acceso arbitrario y no autenticado a un subconjunto limitado de certificados, almacenados en el sistema operativo subyacente de Microsoft Windows.\u0026#xa0;Las versiones corregidas implementan comprobaciones de autenticaci\\u00f3n modificadas.\u0026#xa0;Las versiones anteriores a 3.70 del software VRM no son consideradas afectadas.\u0026#xa0;Esta vulnerabilidad afecta a VRM versiones v3.70.x, v3.71 anteriores a v3.71.0034 y versiones v3.81 anteriores a 3.81.0050;\u0026#xa0;DIVAR IP 5000 versiones 3.80 anteriores a 3.80.0039;\u0026#xa0;BVMS todas las versiones que usan VRM\"}]",
"id": "CVE-2019-11684",
"lastModified": "2024-11-21T04:21:35.223",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"cve@mitre.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L\", \"baseScore\": 9.9, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.3}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-02-26T16:15:12.217",
"references": "[{\"url\": \"https://psirt.bosch.com/security-advisories/bosch-sa-804652.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://psirt.bosch.com/security-advisories/bosch-sa-804652.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-306\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-11684\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-02-26T16:15:12.217\",\"lastModified\":\"2024-11-21T04:21:35.223\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 \u003c v3.71.0034 and v3.81 \u003c 3.81.0050; DIVAR IP 5000 3.80 \u003c 3.80.0039; BVMS all versions using VRM.\"},{\"lang\":\"es\",\"value\":\"Un control de acceso inapropiado en el servidor RCP+ del componente Bosch Video Recording Manager (VRM), permite el acceso arbitrario y no autenticado a un subconjunto limitado de certificados, almacenados en el sistema operativo subyacente de Microsoft Windows.\u0026#xa0;Las versiones corregidas implementan comprobaciones de autenticaci\u00f3n modificadas.\u0026#xa0;Las versiones anteriores a 3.70 del software VRM no son consideradas afectadas.\u0026#xa0;Esta vulnerabilidad afecta a VRM versiones v3.70.x, v3.71 anteriores a v3.71.0034 y versiones v3.81 anteriores a 3.81.0050;\u0026#xa0;DIVAR IP 5000 versiones 3.80 anteriores a 3.80.0039;\u0026#xa0;BVMS todas las versiones que usan VRM\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L\",\"baseScore\":9.9,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":5.3},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.70\",\"versionEndExcluding\":\"3.71.0034\",\"matchCriteriaId\":\"3BF60397-29D1-4764-913F-96F07DE1A403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.81\",\"versionEndExcluding\":\"3.81.0050\",\"matchCriteriaId\":\"B3E94AB7-ABC6-4B3C-97A9-78A8495E793A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.80\",\"versionEndExcluding\":\"3.80.0039\",\"matchCriteriaId\":\"8D5204C5-A853-408E-A7DA-8312056693F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB0DE1C9-D3C0-49BF-9FFD-B765F9AF6691\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.70.0056:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"230D1A5C-D2B1-48E9-A9A1-EDE65491B715\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.70.0058:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60BD9A29-1D4C-44AC-8169-DCDABD21424E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.70.0060:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB8AC9A-7802-4D29-BA8A-FB2E300F3CF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.70.0062:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BE9BAD2-B925-4507-805D-0006850CF815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.71.0022:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B53DABF-8D3C-4470-A981-12363D230938\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.71.0029:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68F65CA5-9032-4DF3-8FA5-122B571DC4A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.71.0031:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"800E0CBC-591B-4EDC-9E3D-633AD3921F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.71.0032:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"327610AC-25F3-4017-9F19-EA13CAE9EC1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.81.0032:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD6ED4A-EAE2-4AD6-AF48-A6383B9F8257\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.81.0038:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8514A9F2-D0AC-4AD4-878C-C1E21D2029E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.81.0048:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4677B06D-B4A9-4892-B735-71FE614E51FD\"}]}]}],\"references\":[{\"url\":\"https://psirt.bosch.com/security-advisories/bosch-sa-804652.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://psirt.bosch.com/security-advisories/bosch-sa-804652.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…