BDU:2025-09856
Vulnerability from fstec - Published: 13.08.2024
VLAI Severity ?
Title
Уязвимость в компонента ASP микропрограммного обеспечения графических процессоров AMD, связанная с неполной очисткой временных или вспомогательных ресурсов, позволяющая нарушителю получить доступ к конфиденциальной информации
Description
Уязвимость в компонента ASP микропрограммного обеспечения графических процессоров AMD связана с неполной очисткой временных или вспомогательных ресурсов. Эксплуатация уязвимости может позволить нарушителю получить доступ к конфиденциальной информации
Severity ?
Vendor
ООО «Ред Софт», Advanced Micro Devices Inc.
Software Name
РЕД ОС (запись в едином реестре российских программ №3751), AMD Ryzen 3000 Series Mobile processor with Radeon graphics, AMD Athlon 3000 Series Mobile processors with Radeon graphics, AMD Ryzen 3000 Series Desktop Processors, AMD Ryzen 5000 Series Desktop Processors, AMD Ryzen 5000 Series Desktop processor with Radeon graphics, AMD Ryzen 7000 Series Desktop Processors, AMD Athlon 3000 Series Desktop Processors with Radeon Graphics, AMD Ryzen 4000 Series Desktop processors with Radeon graphics, AMD Ryzen Threadripper 3000 Series Processors, AMD Ryzen Threadripper PRO 3000WX Series Processors, AMD Ryzen Threadripper PRO 5000WX Processors, AMD Ryzen 4000 Series Mobile processors with Radeon graphics, AMD Ryzen 5000 Series Mobile processor with Radeon graphics, AMD Ryzen 7020 Series Processors with Radeon Graphics, AMD Ryzen 6000 Series Processors with Radeon Graphics, AMD Ryzen 7035 Series Processors with Radeon Graphics, AMD Ryzen 5000 Series Processors with Radeon Graphics, AMD Ryzen 3000 Series Processors with Radeon Graphics
Software Version
7.3 (РЕД ОС), до PicassoPI-FP5 1.0.0.F (AMD Ryzen 3000 Series Mobile processor with Radeon graphics), до PollockPI-FT5 1.0.0.5 (AMD Athlon 3000 Series Mobile processors with Radeon graphics), до ComboAM4V1 1.0.0.A (AMD Ryzen 3000 Series Desktop Processors), до ComboAM4V2 1.2.0.A (AMD Ryzen 3000 Series Desktop Processors), до ComboAM4V2 1.2.0.A (AMD Ryzen 5000 Series Desktop Processors), до ComboAM4V2 1.2.0.A (AMD Ryzen 5000 Series Desktop processor with Radeon graphics), до ComboAM5 1.0.0.6 (AMD Ryzen 7000 Series Desktop Processors), до ComboAM4V2 1.2.0.A (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics), до ComboAM4V1 1.0.0.A (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics), до ComboAM4V2 1.2.0.A (AMD Ryzen 4000 Series Desktop processors with Radeon graphics), до CastlePeakPI-SP3r3 1.0.0.9 (AMD Ryzen Threadripper 3000 Series Processors), до ChagallWSPI-sWRX8 1.0.0.6 (AMD Ryzen Threadripper PRO 3000WX Series Processors), до CastlePeakWSPI-sWRX8 1.0.0.B (AMD Ryzen Threadripper PRO 3000WX Series Processors), до ChagallWSPI-sWRX8 1.0.0.6 (AMD Ryzen Threadripper PRO 5000WX Processors), до PicassoPI-FP5 1.0.0.F (AMD Athlon 3000 Series Mobile processors with Radeon graphics), до RenoirPI-FP6 1.0.0.C (AMD Ryzen 4000 Series Mobile processors with Radeon graphics), до CezannePI-FP6 1.0.0.E (AMD Ryzen 5000 Series Mobile processor with Radeon graphics), до MendocinoPI-FT6 1.0.0.4 (AMD Ryzen 7020 Series Processors with Radeon Graphics), до RembrandtPI-FP7 1.0.0.8 (AMD Ryzen 6000 Series Processors with Radeon Graphics), до RembrandtPI-FP7 1.0.0.8 (AMD Ryzen 7035 Series Processors with Radeon Graphics), до CezannePI-FP6 1.0.0.E (AMD Ryzen 5000 Series Processors with Radeon Graphics), до CezannePI-FP6 1.0.0.E (AMD Ryzen 3000 Series Processors with Radeon Graphics)
Possible Mitigations
Использование рекомендаций:
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5002.html
Для РедОС:
https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-13082025/?sphrase_id=1203948
Reference
https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-13082025/?sphrase_id=1203948
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5002.html
CWE
CWE-459
{
"CVSS 2.0": "AV:L/AC:H/Au:M/C:P/I:N/A:N",
"CVSS 3.0": "AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, Advanced Micro Devices Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7.3 (\u0420\u0415\u0414 \u041e\u0421), \u0434\u043e PicassoPI-FP5 1.0.0.F (AMD Ryzen 3000 Series Mobile processor with Radeon graphics), \u0434\u043e PollockPI-FT5 1.0.0.5 (AMD Athlon 3000 Series Mobile processors with Radeon graphics), \u0434\u043e ComboAM4V1 1.0.0.A (AMD Ryzen 3000 Series Desktop Processors), \u0434\u043e ComboAM4V2 1.2.0.A (AMD Ryzen 3000 Series Desktop Processors), \u0434\u043e ComboAM4V2 1.2.0.A (AMD Ryzen 5000 Series Desktop Processors), \u0434\u043e ComboAM4V2 1.2.0.A (AMD Ryzen 5000 Series Desktop processor with Radeon graphics), \u0434\u043e ComboAM5 1.0.0.6 (AMD Ryzen 7000 Series Desktop Processors), \u0434\u043e ComboAM4V2 1.2.0.A (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics), \u0434\u043e ComboAM4V1 1.0.0.A (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics), \u0434\u043e ComboAM4V2 1.2.0.A (AMD Ryzen 4000 Series Desktop processors with Radeon graphics), \u0434\u043e CastlePeakPI-SP3r3 1.0.0.9 (AMD Ryzen Threadripper 3000 Series Processors), \u0434\u043e ChagallWSPI-sWRX8 1.0.0.6 (AMD Ryzen Threadripper PRO 3000WX Series Processors), \u0434\u043e CastlePeakWSPI-sWRX8 1.0.0.B (AMD Ryzen Threadripper PRO 3000WX Series Processors), \u0434\u043e ChagallWSPI-sWRX8 1.0.0.6 (AMD Ryzen Threadripper PRO 5000WX Processors), \u0434\u043e PicassoPI-FP5 1.0.0.F (AMD Athlon 3000 Series Mobile processors with Radeon graphics), \u0434\u043e RenoirPI-FP6 1.0.0.C (AMD Ryzen 4000 Series Mobile processors with Radeon graphics), \u0434\u043e CezannePI-FP6 1.0.0.E (AMD Ryzen 5000 Series Mobile processor with Radeon graphics), \u0434\u043e MendocinoPI-FT6 1.0.0.4 (AMD Ryzen 7020 Series Processors with Radeon Graphics), \u0434\u043e RembrandtPI-FP7 1.0.0.8 (AMD Ryzen 6000 Series Processors with Radeon Graphics), \u0434\u043e RembrandtPI-FP7 1.0.0.8 (AMD Ryzen 7035 Series Processors with Radeon Graphics), \u0434\u043e CezannePI-FP6 1.0.0.E (AMD Ryzen 5000 Series Processors with Radeon Graphics), \u0434\u043e CezannePI-FP6 1.0.0.E (AMD Ryzen 3000 Series Processors with Radeon Graphics)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html\nhttps://www.amd.com/en/resources/product-security/bulletin/amd-sb-5002.html\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: \nhttps://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-13082025/?sphrase_id=1203948",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "13.08.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "18.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "18.08.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-09856",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-20518",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "\u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), AMD Ryzen 3000 Series Mobile processor with Radeon graphics, AMD Athlon 3000 Series Mobile processors with Radeon graphics, AMD Ryzen 3000 Series Desktop Processors, AMD Ryzen 5000 Series Desktop Processors, AMD Ryzen 5000 Series Desktop processor with Radeon graphics, AMD Ryzen 7000 Series Desktop Processors, AMD Athlon 3000 Series Desktop Processors with Radeon Graphics, AMD Ryzen 4000 Series Desktop processors with Radeon graphics, AMD Ryzen Threadripper 3000 Series Processors, AMD Ryzen Threadripper PRO 3000WX Series Processors, AMD Ryzen Threadripper PRO 5000WX Processors, AMD Ryzen 4000 Series Mobile processors with Radeon graphics, AMD Ryzen 5000 Series Mobile processor with Radeon graphics, AMD Ryzen 7020 Series Processors with Radeon Graphics, AMD Ryzen 6000 Series Processors with Radeon Graphics, AMD Ryzen 7035 Series Processors with Radeon Graphics, AMD Ryzen 5000 Series Processors with Radeon Graphics, AMD Ryzen 3000 Series Processors with Radeon Graphics",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 ASP \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 AMD, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043f\u043e\u043b\u043d\u043e\u0439 \u043e\u0447\u0438\u0441\u0442\u043a\u043e\u0439 \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0445 \u0438\u043b\u0438 \u0432\u0441\u043f\u043e\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u043e\u043b\u043d\u0430\u044f \u043e\u0447\u0438\u0441\u0442\u043a\u0430 (CWE-459)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 ASP \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 AMD \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043f\u043e\u043b\u043d\u043e\u0439 \u043e\u0447\u0438\u0441\u0442\u043a\u043e\u0439 \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0445 \u0438\u043b\u0438 \u0432\u0441\u043f\u043e\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-13082025/?sphrase_id=1203948\nhttps://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html\nhttps://www.amd.com/en/resources/product-security/bulletin/amd-sb-5002.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434, \u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-459",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 0,8)\n\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 1,9)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…