CVE-2023-48713 (GCVE-0-2023-48713)
Vulnerability from cvelistv5 – Published: 2023-11-28 03:44 – Updated: 2024-10-11 17:58
VLAI?
Title
Knative Serving vulnerable to attacker-controlled pod causing denial of service of autoscaler
Summary
Knative Serving builds on Kubernetes to support deploying and serving of applications and functions as serverless containers. An attacker who controls a pod to a degree where they can control the responses from the /metrics endpoint can cause Denial-of-Service of the autoscaler from an unbound memory allocation bug. This is a DoS vulnerability, where a non-privileged Knative user can cause a DoS for the cluster. This issue has been patched in version 0.39.0.
Severity ?
6.5 (Medium)
CWE
- CWE-400 - Uncontrolled Resource Consumption
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T21:37:54.657Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/knative/serving/security/advisories/GHSA-qmvj-4qr9-v547",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/knative/serving/security/advisories/GHSA-qmvj-4qr9-v547"
},
{
"name": "https://github.com/knative/serving/commit/012ee2509231b80b7842139bfabc30516d3026ca",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/knative/serving/commit/012ee2509231b80b7842139bfabc30516d3026ca"
},
{
"name": "https://github.com/knative/serving/commit/101f814112b9ca0767f457e7e616b46205551cf1",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/knative/serving/commit/101f814112b9ca0767f457e7e616b46205551cf1"
},
{
"name": "https://github.com/knative/serving/commit/fff40ef7bac9be8380ec3d1c70fc15b57093382a",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/knative/serving/commit/fff40ef7bac9be8380ec3d1c70fc15b57093382a"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-48713",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-11T17:51:35.195449Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-11T17:58:05.682Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "serving",
"vendor": "knative",
"versions": [
{
"status": "affected",
"version": "\u003c 0.39.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Knative Serving builds on Kubernetes to support deploying and serving of applications and functions as serverless containers. An attacker who controls a pod to a degree where they can control the responses from the /metrics endpoint can cause Denial-of-Service of the autoscaler from an unbound memory allocation bug. This is a DoS vulnerability, where a non-privileged Knative user can cause a DoS for the cluster. This issue has been patched in version 0.39.0."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400: Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-28T03:44:59.538Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/knative/serving/security/advisories/GHSA-qmvj-4qr9-v547",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/knative/serving/security/advisories/GHSA-qmvj-4qr9-v547"
},
{
"name": "https://github.com/knative/serving/commit/012ee2509231b80b7842139bfabc30516d3026ca",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/knative/serving/commit/012ee2509231b80b7842139bfabc30516d3026ca"
},
{
"name": "https://github.com/knative/serving/commit/101f814112b9ca0767f457e7e616b46205551cf1",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/knative/serving/commit/101f814112b9ca0767f457e7e616b46205551cf1"
},
{
"name": "https://github.com/knative/serving/commit/fff40ef7bac9be8380ec3d1c70fc15b57093382a",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/knative/serving/commit/fff40ef7bac9be8380ec3d1c70fc15b57093382a"
}
],
"source": {
"advisory": "GHSA-qmvj-4qr9-v547",
"discovery": "UNKNOWN"
},
"title": "Knative Serving vulnerable to attacker-controlled pod causing denial of service of autoscaler"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2023-48713",
"datePublished": "2023-11-28T03:44:59.538Z",
"dateReserved": "2023-11-17T19:43:37.555Z",
"dateUpdated": "2024-10-11T17:58:05.682Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2023-48713",
"date": "2026-04-25",
"epss": "0.00073",
"percentile": "0.22002"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:knative:serving:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.10.5\", \"matchCriteriaId\": \"F83BBBFD-C622-41D7-BE6A-D7BA52B6B2D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:knative:serving:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.11.0\", \"versionEndExcluding\": \"1.11.3\", \"matchCriteriaId\": \"3672D2F9-C70C-4FC1-8992-B8EB42F755BB\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Knative Serving builds on Kubernetes to support deploying and serving of applications and functions as serverless containers. An attacker who controls a pod to a degree where they can control the responses from the /metrics endpoint can cause Denial-of-Service of the autoscaler from an unbound memory allocation bug. This is a DoS vulnerability, where a non-privileged Knative user can cause a DoS for the cluster. This issue has been patched in version 0.39.0.\"}, {\"lang\": \"es\", \"value\": \"Knative Serving se basa en Kubernetes para admitir la implementaci\\u00f3n y el servicio de aplicaciones y funciones como contenedores sin servidor. Un atacante que controla un pod hasta un punto en el que pueda controlar las respuestas desde el endpoint /metrics puede provocar una Denegaci\\u00f3n de Servicio del escalador autom\\u00e1tico debido a un error de asignaci\\u00f3n de memoria independiente. Esta es una vulnerabilidad DoS, donde un usuario de Knative sin privilegios puede provocar un DoS para el cl\\u00faster. Este problema se solucion\\u00f3 en la versi\\u00f3n 0.39.0.\"}]",
"id": "CVE-2023-48713",
"lastModified": "2024-11-21T08:32:18.947",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 3.6}]}",
"published": "2023-11-28T04:15:07.820",
"references": "[{\"url\": \"https://github.com/knative/serving/commit/012ee2509231b80b7842139bfabc30516d3026ca\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/knative/serving/commit/101f814112b9ca0767f457e7e616b46205551cf1\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/knative/serving/commit/fff40ef7bac9be8380ec3d1c70fc15b57093382a\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/knative/serving/security/advisories/GHSA-qmvj-4qr9-v547\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/knative/serving/commit/012ee2509231b80b7842139bfabc30516d3026ca\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/knative/serving/commit/101f814112b9ca0767f457e7e616b46205551cf1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/knative/serving/commit/fff40ef7bac9be8380ec3d1c70fc15b57093382a\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/knative/serving/security/advisories/GHSA-qmvj-4qr9-v547\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-400\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-48713\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-11-28T04:15:07.820\",\"lastModified\":\"2024-11-21T08:32:18.947\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Knative Serving builds on Kubernetes to support deploying and serving of applications and functions as serverless containers. An attacker who controls a pod to a degree where they can control the responses from the /metrics endpoint can cause Denial-of-Service of the autoscaler from an unbound memory allocation bug. This is a DoS vulnerability, where a non-privileged Knative user can cause a DoS for the cluster. This issue has been patched in version 0.39.0.\"},{\"lang\":\"es\",\"value\":\"Knative Serving se basa en Kubernetes para admitir la implementaci\u00f3n y el servicio de aplicaciones y funciones como contenedores sin servidor. Un atacante que controla un pod hasta un punto en el que pueda controlar las respuestas desde el endpoint /metrics puede provocar una Denegaci\u00f3n de Servicio del escalador autom\u00e1tico debido a un error de asignaci\u00f3n de memoria independiente. Esta es una vulnerabilidad DoS, donde un usuario de Knative sin privilegios puede provocar un DoS para el cl\u00faster. Este problema se solucion\u00f3 en la versi\u00f3n 0.39.0.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:knative:serving:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.10.5\",\"matchCriteriaId\":\"F83BBBFD-C622-41D7-BE6A-D7BA52B6B2D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:knative:serving:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.11.0\",\"versionEndExcluding\":\"1.11.3\",\"matchCriteriaId\":\"3672D2F9-C70C-4FC1-8992-B8EB42F755BB\"}]}]}],\"references\":[{\"url\":\"https://github.com/knative/serving/commit/012ee2509231b80b7842139bfabc30516d3026ca\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/knative/serving/commit/101f814112b9ca0767f457e7e616b46205551cf1\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/knative/serving/commit/fff40ef7bac9be8380ec3d1c70fc15b57093382a\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/knative/serving/security/advisories/GHSA-qmvj-4qr9-v547\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/knative/serving/commit/012ee2509231b80b7842139bfabc30516d3026ca\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/knative/serving/commit/101f814112b9ca0767f457e7e616b46205551cf1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/knative/serving/commit/fff40ef7bac9be8380ec3d1c70fc15b57093382a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/knative/serving/security/advisories/GHSA-qmvj-4qr9-v547\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"Knative Serving vulnerable to attacker-controlled pod causing denial of service of autoscaler\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-400\", \"lang\": \"en\", \"description\": \"CWE-400: Uncontrolled Resource Consumption\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"version\": \"3.1\"}}], \"references\": [{\"name\": \"https://github.com/knative/serving/security/advisories/GHSA-qmvj-4qr9-v547\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/knative/serving/security/advisories/GHSA-qmvj-4qr9-v547\"}, {\"name\": \"https://github.com/knative/serving/commit/012ee2509231b80b7842139bfabc30516d3026ca\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/knative/serving/commit/012ee2509231b80b7842139bfabc30516d3026ca\"}, {\"name\": \"https://github.com/knative/serving/commit/101f814112b9ca0767f457e7e616b46205551cf1\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/knative/serving/commit/101f814112b9ca0767f457e7e616b46205551cf1\"}, {\"name\": \"https://github.com/knative/serving/commit/fff40ef7bac9be8380ec3d1c70fc15b57093382a\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/knative/serving/commit/fff40ef7bac9be8380ec3d1c70fc15b57093382a\"}], \"affected\": [{\"vendor\": \"knative\", \"product\": \"serving\", \"versions\": [{\"version\": \"\u003c 0.39.0\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2023-11-28T03:44:59.538Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Knative Serving builds on Kubernetes to support deploying and serving of applications and functions as serverless containers. An attacker who controls a pod to a degree where they can control the responses from the /metrics endpoint can cause Denial-of-Service of the autoscaler from an unbound memory allocation bug. This is a DoS vulnerability, where a non-privileged Knative user can cause a DoS for the cluster. This issue has been patched in version 0.39.0.\"}], \"source\": {\"advisory\": \"GHSA-qmvj-4qr9-v547\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T21:37:54.657Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"name\": \"https://github.com/knative/serving/security/advisories/GHSA-qmvj-4qr9-v547\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://github.com/knative/serving/security/advisories/GHSA-qmvj-4qr9-v547\"}, {\"name\": \"https://github.com/knative/serving/commit/012ee2509231b80b7842139bfabc30516d3026ca\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://github.com/knative/serving/commit/012ee2509231b80b7842139bfabc30516d3026ca\"}, {\"name\": \"https://github.com/knative/serving/commit/101f814112b9ca0767f457e7e616b46205551cf1\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://github.com/knative/serving/commit/101f814112b9ca0767f457e7e616b46205551cf1\"}, {\"name\": \"https://github.com/knative/serving/commit/fff40ef7bac9be8380ec3d1c70fc15b57093382a\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://github.com/knative/serving/commit/fff40ef7bac9be8380ec3d1c70fc15b57093382a\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-48713\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-11T17:51:35.195449Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-11T17:52:42.765Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2023-48713\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2023-11-17T19:43:37.555Z\", \"datePublished\": \"2023-11-28T03:44:59.538Z\", \"dateUpdated\": \"2024-10-11T17:58:05.682Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…