CVE-2017-8046 (GCVE-0-2017-8046)

Vulnerability from cvelistv5 – Published: 2018-01-04 06:00 – Updated: 2024-08-05 16:19
VLAI?
Summary
Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.
Severity ?
No CVSS data available.
CWE
  • run arbitrary Java code
Assigner
References
https://pivotal.io/security/cve-2017-8046 x_refsource_CONFIRM
https://access.redhat.com/errata/RHSA-2018:2405 vendor-advisoryx_refsource_REDHAT
http://www.securityfocus.com/bid/100948 vdb-entryx_refsource_BID
https://www.exploit-db.com/exploits/44289/ exploitx_refsource_EXPLOIT-DB
Impacted products
Vendor Product Version
Pivotal Pivotal Spring Data REST and Spring Boot Affected: Pivotal Spring Data REST versions prior to 2.6.9 (Ingalls SR9), 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:19:29.628Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://pivotal.io/security/cve-2017-8046"
          },
          {
            "name": "RHSA-2018:2405",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2018:2405"
          },
          {
            "name": "100948",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/100948"
          },
          {
            "name": "44289",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/44289/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Pivotal Spring Data REST and Spring Boot",
          "vendor": "Pivotal",
          "versions": [
            {
              "status": "affected",
              "version": "Pivotal Spring Data REST versions prior to 2.6.9 (Ingalls SR9), 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6"
            }
          ]
        }
      ],
      "datePublic": "2018-01-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "run arbitrary Java code",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-08-15T09:57:01",
        "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
        "shortName": "dell"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://pivotal.io/security/cve-2017-8046"
        },
        {
          "name": "RHSA-2018:2405",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2018:2405"
        },
        {
          "name": "100948",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/100948"
        },
        {
          "name": "44289",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/44289/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security_alert@emc.com",
          "ID": "CVE-2017-8046",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Pivotal Spring Data REST and Spring Boot",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Pivotal Spring Data REST versions prior to 2.6.9 (Ingalls SR9), 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Pivotal"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "run arbitrary Java code"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://pivotal.io/security/cve-2017-8046",
              "refsource": "CONFIRM",
              "url": "https://pivotal.io/security/cve-2017-8046"
            },
            {
              "name": "RHSA-2018:2405",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2018:2405"
            },
            {
              "name": "100948",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/100948"
            },
            {
              "name": "44289",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/44289/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
    "assignerShortName": "dell",
    "cveId": "CVE-2017-8046",
    "datePublished": "2018-01-04T06:00:00",
    "dateReserved": "2017-04-21T00:00:00",
    "dateUpdated": "2024-08-05T16:19:29.628Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.5.9\", \"matchCriteriaId\": \"2D178DD5-5C7C-4954-AE5C-7805EEE0869B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:spring_boot:2.0.0:milestone1:*:*:*:*:*:*\", \"matchCriteriaId\": \"141F2C99-AD34-4003-81D4-689F3F1A53ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:spring_boot:2.0.0:milestone2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7929E66-FCA2-4D1B-B29F-55BF70AF70C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:spring_boot:2.0.0:milestone3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6B93CDA-E5D9-4955-910A-22B38779F23C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:spring_boot:2.0.0:milestone4:*:*:*:*:*:*\", \"matchCriteriaId\": \"F324F68E-CF50-4F2E-90E4-3620CE05A944\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:spring_boot:2.0.0:milestone5:*:*:*:*:*:*\", \"matchCriteriaId\": \"C120785F-A827-4870-B33B-679367A9EB20\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal_software:spring_data_rest:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.6.9\", \"matchCriteriaId\": \"D9D3B917-F9C9-417C-830E-475DBFB58D07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB3CC672-C90E-40FD-890F-93C4F5338513\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:m1:*:*:*:*:*:*\", \"matchCriteriaId\": \"360B3EDD-18D5-44D7-A998-89F55DD9F5E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:m2:*:*:*:*:*:*\", \"matchCriteriaId\": \"95140537-ECA9-4A68-BD05-AEE47C36DD94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:m3:*:*:*:*:*:*\", \"matchCriteriaId\": \"47F7A32E-5F18-4651-842D-968FE380AA98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:m4:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCCDFF26-CF5B-44A6-8EDE-0A5353C669DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1D52612-B862-4B71-A7CA-03A32CB3B0D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"89BE7C06-D620-4AB2-8388-4A9CCC6C5A97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BC56E79-77CE-4AFA-AF93-1B9FADE9F3CB\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.\"}, {\"lang\": \"es\", \"value\": \"Las peticiones PATCH maliciosas enviadas a servidores que utilizan versiones Spring Data REST anteriores a la 2.6.9 (Ingalls SR9), versiones anteriores a la 3.0.1 (Kay SR1) y versiones Spring Boot anteriores a la 1.5.9, 2.0 M6 pueden utilizar datos JSON especialmente dise\\u00f1ados para ejecutar c\\u00f3digo Java arbitrario.\"}]",
      "id": "CVE-2017-8046",
      "lastModified": "2024-11-21T03:33:12.757",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2018-01-04T06:29:00.307",
      "references": "[{\"url\": \"http://www.securityfocus.com/bid/100948\", \"source\": \"security_alert@emc.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2405\", \"source\": \"security_alert@emc.com\"}, {\"url\": \"https://pivotal.io/security/cve-2017-8046\", \"source\": \"security_alert@emc.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.exploit-db.com/exploits/44289/\", \"source\": \"security_alert@emc.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/bid/100948\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2405\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://pivotal.io/security/cve-2017-8046\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.exploit-db.com/exploits/44289/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}]",
      "sourceIdentifier": "security_alert@emc.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2017-8046\",\"sourceIdentifier\":\"security_alert@emc.com\",\"published\":\"2018-01-04T06:29:00.307\",\"lastModified\":\"2024-11-21T03:33:12.757\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.\"},{\"lang\":\"es\",\"value\":\"Las peticiones PATCH maliciosas enviadas a servidores que utilizan versiones Spring Data REST anteriores a la 2.6.9 (Ingalls SR9), versiones anteriores a la 3.0.1 (Kay SR1) y versiones Spring Boot anteriores a la 1.5.9, 2.0 M6 pueden utilizar datos JSON especialmente dise\u00f1ados para ejecutar c\u00f3digo Java arbitrario.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.5.9\",\"matchCriteriaId\":\"2D178DD5-5C7C-4954-AE5C-7805EEE0869B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:spring_boot:2.0.0:milestone1:*:*:*:*:*:*\",\"matchCriteriaId\":\"141F2C99-AD34-4003-81D4-689F3F1A53ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:spring_boot:2.0.0:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7929E66-FCA2-4D1B-B29F-55BF70AF70C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:spring_boot:2.0.0:milestone3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6B93CDA-E5D9-4955-910A-22B38779F23C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:spring_boot:2.0.0:milestone4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F324F68E-CF50-4F2E-90E4-3620CE05A944\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:spring_boot:2.0.0:milestone5:*:*:*:*:*:*\",\"matchCriteriaId\":\"C120785F-A827-4870-B33B-679367A9EB20\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal_software:spring_data_rest:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.9\",\"matchCriteriaId\":\"D9D3B917-F9C9-417C-830E-475DBFB58D07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB3CC672-C90E-40FD-890F-93C4F5338513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:m1:*:*:*:*:*:*\",\"matchCriteriaId\":\"360B3EDD-18D5-44D7-A998-89F55DD9F5E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:m2:*:*:*:*:*:*\",\"matchCriteriaId\":\"95140537-ECA9-4A68-BD05-AEE47C36DD94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:m3:*:*:*:*:*:*\",\"matchCriteriaId\":\"47F7A32E-5F18-4651-842D-968FE380AA98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:m4:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCCDFF26-CF5B-44A6-8EDE-0A5353C669DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1D52612-B862-4B71-A7CA-03A32CB3B0D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"89BE7C06-D620-4AB2-8388-4A9CCC6C5A97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal_software:spring_data_rest:3.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC56E79-77CE-4AFA-AF93-1B9FADE9F3CB\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/100948\",\"source\":\"security_alert@emc.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2405\",\"source\":\"security_alert@emc.com\"},{\"url\":\"https://pivotal.io/security/cve-2017-8046\",\"source\":\"security_alert@emc.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44289/\",\"source\":\"security_alert@emc.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/100948\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2405\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://pivotal.io/security/cve-2017-8046\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44289/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…