CVE-2021-36739 (GCVE-0-2021-36739)
Vulnerability from cvelistv5 – Published: 2022-01-06 08:50 – Updated: 2025-05-22 18:35
VLAI?
Title
XSS vulnerability in the MVCBean JSP portlet maven archetype
Summary
The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.
Severity ?
No CVSS data available.
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apache Software Foundation | Apache Portals |
Affected:
org.apache.portals.pluto.archetype:mvcbean-jsp-portlet-archetype 3.1.0
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T01:01:59.033Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2021-36739",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-22T15:43:37.472219Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-22T18:35:31.820Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Apache Portals",
"vendor": "Apache Software Foundation",
"versions": [
{
"status": "affected",
"version": "org.apache.portals.pluto.archetype:mvcbean-jsp-portlet-archetype 3.1.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The \"first name\" and \"last name\" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks."
}
],
"metrics": [
{
"other": {
"content": {
"other": "moderate"
},
"type": "unknown"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-01-06T08:50:16.000Z",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "XSS vulnerability in the MVCBean JSP portlet maven archetype",
"workarounds": [
{
"lang": "en",
"value": "If a project was generated from the affected maven archetype using a command like the following:\n\nmvn archetype:generate \\\n -DarchetypeGroupId=org.apache.portals.pluto.archetype \\\n -DarchetypeArtifactId=mvcbean-jsp-portlet-archetype \\\n -DarchetypeVersion=3.1.0 \\\n -DgroupId=com.mycompany \\\n -DartifactId=com.mycompany.my.mvcbean.jsp.portlet\n\nThen developers must fix the generated greeting.jspx file by escaping the rendered values submitted to the \"First Name\" and \"Last Name\" fields.\n\nFor example, change:\n\n \u003cspan\u003e${user.firstName} ${user.lastName}! \u003c/span\u003e\n\nTo:\n\n \u003cspan\u003e${mvc.encoders.html(user.firstName)} ${mvc.encoders.html(user.lastName)}! \u003c/span\u003e\n\nMoving forward, all such projects should be generated from version 3.1.1 of the Maven archetype.\n"
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2021-36739",
"STATE": "PUBLIC",
"TITLE": "XSS vulnerability in the MVCBean JSP portlet maven archetype"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache Portals",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "org.apache.portals.pluto.archetype:mvcbean-jsp-portlet-archetype",
"version_value": "3.1.0"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The \"first name\" and \"last name\" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": [
{
"other": "moderate"
}
],
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p",
"refsource": "MISC",
"url": "https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p"
}
]
},
"source": {
"discovery": "UNKNOWN"
},
"work_around": [
{
"lang": "en",
"value": "If a project was generated from the affected maven archetype using a command like the following:\n\nmvn archetype:generate \\\n -DarchetypeGroupId=org.apache.portals.pluto.archetype \\\n -DarchetypeArtifactId=mvcbean-jsp-portlet-archetype \\\n -DarchetypeVersion=3.1.0 \\\n -DgroupId=com.mycompany \\\n -DartifactId=com.mycompany.my.mvcbean.jsp.portlet\n\nThen developers must fix the generated greeting.jspx file by escaping the rendered values submitted to the \"First Name\" and \"Last Name\" fields.\n\nFor example, change:\n\n \u003cspan\u003e${user.firstName} ${user.lastName}! \u003c/span\u003e\n\nTo:\n\n \u003cspan\u003e${mvc.encoders.html(user.firstName)} ${mvc.encoders.html(user.lastName)}! \u003c/span\u003e\n\nMoving forward, all such projects should be generated from version 3.1.1 of the Maven archetype.\n"
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2021-36739",
"datePublished": "2022-01-06T08:50:16.000Z",
"dateReserved": "2021-07-14T00:00:00.000Z",
"dateUpdated": "2025-05-22T18:35:31.820Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:pluto:3.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D4A788B-7A08-4C24-8136-899DFAAA3462\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The \\\"first name\\\" and \\\"last name\\\" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.\"}, {\"lang\": \"es\", \"value\": \"Los campos \\\"first name\\\" y \\\"last name\\\" del arquetipo maven de portlet MVCBean de Apache Pluto versi\\u00f3n 3.1.0, son vulnerables a ataques de tipo Cross-Site Scripting (XSS).\"}]",
"id": "CVE-2021-36739",
"lastModified": "2024-11-21T06:13:59.493",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2022-01-06T09:15:07.327",
"references": "[{\"url\": \"https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p\", \"source\": \"security@apache.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security@apache.org\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-36739\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2022-01-06T09:15:07.327\",\"lastModified\":\"2025-05-22T19:15:24.887\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The \\\"first name\\\" and \\\"last name\\\" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.\"},{\"lang\":\"es\",\"value\":\"Los campos \\\"first name\\\" y \\\"last name\\\" del arquetipo maven de portlet MVCBean de Apache Pluto versi\u00f3n 3.1.0, son vulnerables a ataques de tipo Cross-Site Scripting (XSS).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:pluto:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D4A788B-7A08-4C24-8136-899DFAAA3462\"}]}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T01:01:59.033Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-36739\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-22T15:43:37.472219Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-22T15:44:52.896Z\"}}], \"cna\": {\"title\": \"XSS vulnerability in the MVCBean JSP portlet maven archetype\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"other\": {\"type\": \"unknown\", \"content\": {\"other\": \"moderate\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Portals\", \"versions\": [{\"status\": \"affected\", \"version\": \"org.apache.portals.pluto.archetype:mvcbean-jsp-portlet-archetype 3.1.0\"}]}], \"references\": [{\"url\": \"https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p\", \"tags\": [\"x_refsource_MISC\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"If a project was generated from the affected maven archetype using a command like the following:\\n\\nmvn archetype:generate \\\\\\n -DarchetypeGroupId=org.apache.portals.pluto.archetype \\\\\\n -DarchetypeArtifactId=mvcbean-jsp-portlet-archetype \\\\\\n -DarchetypeVersion=3.1.0 \\\\\\n -DgroupId=com.mycompany \\\\\\n -DartifactId=com.mycompany.my.mvcbean.jsp.portlet\\n\\nThen developers must fix the generated greeting.jspx file by escaping the rendered values submitted to the \\\"First Name\\\" and \\\"Last Name\\\" fields.\\n\\nFor example, change:\\n\\n \u003cspan\u003e${user.firstName} ${user.lastName}! \u003c/span\u003e\\n\\nTo:\\n\\n \u003cspan\u003e${mvc.encoders.html(user.firstName)} ${mvc.encoders.html(user.lastName)}! \u003c/span\u003e\\n\\nMoving forward, all such projects should be generated from version 3.1.1 of the Maven archetype.\\n\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The \\\"first name\\\" and \\\"last name\\\" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2022-01-06T08:50:16.000Z\"}, \"x_legacyV4Record\": {\"impact\": [{\"other\": \"moderate\"}], \"source\": {\"discovery\": \"UNKNOWN\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_name\": \"org.apache.portals.pluto.archetype:mvcbean-jsp-portlet-archetype\", \"version_value\": \"3.1.0\", \"version_affected\": \"=\"}]}, \"product_name\": \"Apache Portals\"}]}, \"vendor_name\": \"Apache Software Foundation\"}]}}, \"data_type\": \"CVE\", \"generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"references\": {\"reference_data\": [{\"url\": \"https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p\", \"name\": \"https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"The \\\"first name\\\" and \\\"last name\\\" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}]}, \"work_around\": [{\"lang\": \"en\", \"value\": \"If a project was generated from the affected maven archetype using a command like the following:\\n\\nmvn archetype:generate \\\\\\n -DarchetypeGroupId=org.apache.portals.pluto.archetype \\\\\\n -DarchetypeArtifactId=mvcbean-jsp-portlet-archetype \\\\\\n -DarchetypeVersion=3.1.0 \\\\\\n -DgroupId=com.mycompany \\\\\\n -DartifactId=com.mycompany.my.mvcbean.jsp.portlet\\n\\nThen developers must fix the generated greeting.jspx file by escaping the rendered values submitted to the \\\"First Name\\\" and \\\"Last Name\\\" fields.\\n\\nFor example, change:\\n\\n \u003cspan\u003e${user.firstName} ${user.lastName}! \u003c/span\u003e\\n\\nTo:\\n\\n \u003cspan\u003e${mvc.encoders.html(user.firstName)} ${mvc.encoders.html(user.lastName)}! \u003c/span\u003e\\n\\nMoving forward, all such projects should be generated from version 3.1.1 of the Maven archetype.\\n\"}], \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2021-36739\", \"STATE\": \"PUBLIC\", \"TITLE\": \"XSS vulnerability in the MVCBean JSP portlet maven archetype\", \"ASSIGNER\": \"security@apache.org\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-36739\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-22T18:35:31.820Z\", \"dateReserved\": \"2021-07-14T00:00:00.000Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2022-01-06T08:50:16.000Z\", \"assignerShortName\": \"apache\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…