CVE-2002-0628 (GCVE-0-2002-0628)
Vulnerability from cvelistv5 – Published: 2003-01-03 05:00 – Updated: 2024-08-08 02:56
VLAI?
Summary
The Telnet service for Polycom ViewStation before 7.2.4 does not restrict the number of failed login attempts, which makes it easier for remote attackers to guess usernames and passwords via a brute force attack.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:56:38.269Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "5635",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/5635"
},
{
"name": "viewstation-telnet-login-dos(9349)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/9349.php"
},
{
"name": "20020904 Multiple Remote Vulnerabilities in Polycom Videoconferencing Products",
"tags": [
"third-party-advisory",
"x_refsource_ISS",
"x_transferred"
],
"url": "http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21089"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.polycom.com/common/pw_item_show_doc/0%2C%2C1444%2C00.pdf"
},
{
"name": "viewstation-telnet-login-info-disclosure(44241)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44241"
},
{
"name": "M-123",
"tags": [
"third-party-advisory",
"government-resource",
"x_refsource_CIAC",
"x_transferred"
],
"url": "http://www.ciac.org/ciac/bulletins/m-123.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-09-04T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Telnet service for Polycom ViewStation before 7.2.4 does not restrict the number of failed login attempts, which makes it easier for remote attackers to guess usernames and passwords via a brute force attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "5635",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/5635"
},
{
"name": "viewstation-telnet-login-dos(9349)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/9349.php"
},
{
"name": "20020904 Multiple Remote Vulnerabilities in Polycom Videoconferencing Products",
"tags": [
"third-party-advisory",
"x_refsource_ISS"
],
"url": "http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21089"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.polycom.com/common/pw_item_show_doc/0%2C%2C1444%2C00.pdf"
},
{
"name": "viewstation-telnet-login-info-disclosure(44241)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44241"
},
{
"name": "M-123",
"tags": [
"third-party-advisory",
"government-resource",
"x_refsource_CIAC"
],
"url": "http://www.ciac.org/ciac/bulletins/m-123.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0628",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Telnet service for Polycom ViewStation before 7.2.4 does not restrict the number of failed login attempts, which makes it easier for remote attackers to guess usernames and passwords via a brute force attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "5635",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5635"
},
{
"name": "viewstation-telnet-login-dos(9349)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9349.php"
},
{
"name": "20020904 Multiple Remote Vulnerabilities in Polycom Videoconferencing Products",
"refsource": "ISS",
"url": "http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21089"
},
{
"name": "http://www.polycom.com/common/pw_item_show_doc/0,,1444,00.pdf",
"refsource": "CONFIRM",
"url": "http://www.polycom.com/common/pw_item_show_doc/0,,1444,00.pdf"
},
{
"name": "viewstation-telnet-login-info-disclosure(44241)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44241"
},
{
"name": "M-123",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/m-123.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0628",
"datePublished": "2003-01-03T05:00:00",
"dateReserved": "2002-06-17T00:00:00",
"dateUpdated": "2024-08-08T02:56:38.269Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_128:6.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82DD3A4C-3C97-4846-8978-282374E403AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_128:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6174A218-F390-4FA2-BF8B-5F8EE481E8A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_512:6.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB674D32-6C43-4A35-B589-8E361A89EE51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_512:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB1438E9-67A7-40D8-8139-49573D65BF33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_dcp:6.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5028B3B9-FB55-436D-A4CA-07ED6FD4419A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_dcp:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6FE7FB9-3311-4653-AEE2-70FD102D61E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_fx_vs4000:4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB002B45-6E30-445F-82A0-88755E19FC43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_h.323:6.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA6A392C-04D6-4C4C-9254-1BF9F3F637C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_h.323:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"875A029F-2EEE-42FD-9193-AE90414063B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_mp:6.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA8A8DA7-77AF-4A60-BAF6-DFB891ED5787\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_mp:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A507CE44-4513-4861-B2B2-2B4AF755C61D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_sp_384:6.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97EF2076-D358-4087-BC16-37FA78101EBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_sp_384:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7FD9573-3736-4086-B0A2-49CF86526D3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_v.35:6.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A9729B7-A118-41E1-85DE-9072E00BF66A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:polycom:viewstation_v.35:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDFB03A6-9733-4A69-8D7E-700B718924DC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The Telnet service for Polycom ViewStation before 7.2.4 does not restrict the number of failed login attempts, which makes it easier for remote attackers to guess usernames and passwords via a brute force attack.\"}, {\"lang\": \"es\", \"value\": \"El servicio Telnet en Polycom ViewStation 7.2 y anteriores no restringe el n\\u00famero de intentos de inicio de sesi\\u00f3n fallidos, lo que facilita a atacantes remotos la obtenci\\u00f3n de nombres de usuario y contrase\\u00f1as mediante ataques de fuerza bruta.\"}]",
"id": "CVE-2002-0628",
"lastModified": "2024-11-20T23:39:30.677",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2003-01-07T05:00:00.000",
"references": "[{\"url\": \"http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21089\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.ciac.org/ciac/bulletins/m-123.shtml\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.iss.net/security_center/static/9349.php\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\", \"Vendor Advisory\"]}, {\"url\": \"http://www.polycom.com/common/pw_item_show_doc/0%2C%2C1444%2C00.pdf\", \"source\": \"cve@mitre.org\", \"tags\": [\"Product\"]}, {\"url\": \"http://www.securityfocus.com/bid/5635\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/44241\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21089\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.ciac.org/ciac/bulletins/m-123.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.iss.net/security_center/static/9349.php\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Vendor Advisory\"]}, {\"url\": \"http://www.polycom.com/common/pw_item_show_doc/0%2C%2C1444%2C00.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\"]}, {\"url\": \"http://www.securityfocus.com/bid/5635\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/44241\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-307\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2002-0628\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2003-01-07T05:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Telnet service for Polycom ViewStation before 7.2.4 does not restrict the number of failed login attempts, which makes it easier for remote attackers to guess usernames and passwords via a brute force attack.\"},{\"lang\":\"es\",\"value\":\"El servicio Telnet en Polycom ViewStation 7.2 y anteriores no restringe el n\u00famero de intentos de inicio de sesi\u00f3n fallidos, lo que facilita a atacantes remotos la obtenci\u00f3n de nombres de usuario y contrase\u00f1as mediante ataques de fuerza bruta.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-307\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_128:6.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82DD3A4C-3C97-4846-8978-282374E403AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_128:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6174A218-F390-4FA2-BF8B-5F8EE481E8A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_512:6.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB674D32-6C43-4A35-B589-8E361A89EE51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_512:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB1438E9-67A7-40D8-8139-49573D65BF33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_dcp:6.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5028B3B9-FB55-436D-A4CA-07ED6FD4419A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_dcp:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6FE7FB9-3311-4653-AEE2-70FD102D61E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_fx_vs4000:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB002B45-6E30-445F-82A0-88755E19FC43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_h.323:6.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA6A392C-04D6-4C4C-9254-1BF9F3F637C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_h.323:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"875A029F-2EEE-42FD-9193-AE90414063B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_mp:6.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA8A8DA7-77AF-4A60-BAF6-DFB891ED5787\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_mp:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A507CE44-4513-4861-B2B2-2B4AF755C61D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_sp_384:6.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97EF2076-D358-4087-BC16-37FA78101EBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_sp_384:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7FD9573-3736-4086-B0A2-49CF86526D3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_v.35:6.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A9729B7-A118-41E1-85DE-9072E00BF66A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:polycom:viewstation_v.35:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDFB03A6-9733-4A69-8D7E-700B718924DC\"}]}]}],\"references\":[{\"url\":\"http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21089\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.ciac.org/ciac/bulletins/m-123.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.iss.net/security_center/static/9349.php\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.polycom.com/common/pw_item_show_doc/0%2C%2C1444%2C00.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\"]},{\"url\":\"http://www.securityfocus.com/bid/5635\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44241\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21089\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.ciac.org/ciac/bulletins/m-123.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.iss.net/security_center/static/9349.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.polycom.com/common/pw_item_show_doc/0%2C%2C1444%2C00.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"http://www.securityfocus.com/bid/5635\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44241\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…