cve-2023-34035
Vulnerability from cvelistv5
Published
2023-07-18 15:29
Modified
2024-10-25 15:47
Summary
Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s DispatcherServlet. (DispatcherServlet is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.) Specifically, an application is vulnerable when all of the following are true: * Spring MVC is on the classpath * Spring Security is securing more than one servlet in a single application (one of them being Spring MVC’s DispatcherServlet) * The application uses requestMatchers(String) to refer to endpoints that are not Spring MVC endpoints An application is not vulnerable if any of the following is true: * The application does not have Spring MVC on the classpath * The application secures no servlets other than Spring MVC’s DispatcherServlet * The application uses requestMatchers(String) only for Spring MVC endpoints
Impacted products
Vendor Product Version
n/a Spring Security Version: Spring Security 5.8.0 to 5.8.4, Spring Security 6.0.0 to 6.0.4, Spring Security 6.1.0 to 6.1.1
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:54:14.210Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://spring.io/security/cve-2023-34035",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-34035",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-25T15:47:27.642233Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-25T15:47:50.802Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Spring Security",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Spring Security 5.8.0 to 5.8.4, Spring Security 6.0.0 to 6.0.4, Spring Security 6.1.0 to 6.1.1",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<span style=\"background-color: rgb(255, 255, 255);\">Spring Security versions </span><strong>5.8</strong><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;prior to </span><strong>5.8.5</strong><span style=\"background-color: rgb(255, 255, 255);\">, </span><strong>6.0</strong><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;prior to </span><strong>6.0.5,</strong><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;and </span><strong>6.1</strong><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;prior to </span><strong>6.1.2</strong><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;could be susceptible to authorization rule misconfiguration if the application uses </span><code>requestMatchers(String)</code><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;and multiple servlets, one of them being Spring MVC’s DispatcherServlet.&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">(</span><code>DispatcherServlet</code><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;is a Spring MVC component that maps HTTP endpoints to methods on </span><code>@Controller</code><span style=\"background-color: rgb(255, 255, 255);\">-annotated classes.)<br></span></span><br><p>Specifically, an application is vulnerable when all of the following are true:</p><ul><li>Spring MVC is on the classpath</li><li>Spring Security is securing more than one servlet in a single application (one of them being Spring MVC’s <code>DispatcherServlet</code>)</li><li>The application uses <code>requestMatchers(String)</code>&nbsp;to refer to endpoints that are not Spring MVC endpoints</li></ul><p>An application is not vulnerable if any of the following is true:</p><ul><li>The application does not have Spring MVC on the classpath</li><li>The application secures no servlets other than Spring MVC’s <code>DispatcherServlet</code></li><li>The application uses <code>requestMatchers(String)</code>&nbsp;only for Spring MVC endpoints</li></ul><br>",
                  },
               ],
               value: "Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s DispatcherServlet. (DispatcherServlet is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.)\n\nSpecifically, an application is vulnerable when all of the following are true:\n\n  *  Spring MVC is on the classpath\n  *  Spring Security is securing more than one servlet in a single application (one of them being Spring MVC’s DispatcherServlet)\n  *  The application uses requestMatchers(String) to refer to endpoints that are not Spring MVC endpoints\n\n\nAn application is not vulnerable if any of the following is true:\n\n  *  The application does not have Spring MVC on the classpath\n  *  The application secures no servlets other than Spring MVC’s DispatcherServlet\n  *  The application uses requestMatchers(String) only for Spring MVC endpoints\n\n\n\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Authorization rule misconfiguration",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-18T15:29:10.091Z",
            orgId: "dcf2e128-44bd-42ed-91e8-88f912c1401d",
            shortName: "vmware",
         },
         references: [
            {
               url: "https://spring.io/security/cve-2023-34035",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "dcf2e128-44bd-42ed-91e8-88f912c1401d",
      assignerShortName: "vmware",
      cveId: "CVE-2023-34035",
      datePublished: "2023-07-18T15:29:10.091Z",
      dateReserved: "2023-05-25T17:21:56.200Z",
      dateUpdated: "2024-10-25T15:47:50.802Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      fkie_nvd: {
         configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.8.0\", \"versionEndExcluding\": \"5.8.5\", \"matchCriteriaId\": \"C459A8B6-D5BD-4504-90DF-B539AFD4027E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.0.0\", \"versionEndExcluding\": \"6.0.5\", \"matchCriteriaId\": \"9FC21F29-5A00-49C9-BDBD-F488E6E35AE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.1.0\", \"versionEndExcluding\": \"6.1.2\", \"matchCriteriaId\": \"75F8781A-895F-4602-BA07-32BF2DF04CC9\"}]}]}]",
         descriptions: "[{\"lang\": \"en\", \"value\": \"Spring Security versions 5.8\\u00a0prior to 5.8.5, 6.0\\u00a0prior to 6.0.5,\\u00a0and 6.1\\u00a0prior to 6.1.2\\u00a0could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String)\\u00a0and multiple servlets, one of them being Spring MVC\\u2019s DispatcherServlet.\\u00a0(DispatcherServlet\\u00a0is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.)\\n\\nSpecifically, an application is vulnerable when all of the following are true:\\n\\n  *  Spring MVC is on the classpath\\n  *  Spring Security is securing more than one servlet in a single application (one of them being Spring MVC\\u2019s DispatcherServlet)\\n  *  The application uses requestMatchers(String)\\u00a0to refer to endpoints that are not Spring MVC endpoints\\n\\n\\nAn application is not vulnerable if any of the following is true:\\n\\n  *  The application does not have Spring MVC on the classpath\\n  *  The application secures no servlets other than Spring MVC\\u2019s DispatcherServlet\\n  *  The application uses requestMatchers(String)\\u00a0only for Spring MVC endpoints\\n\\n\\n\\n\"}]",
         id: "CVE-2023-34035",
         lastModified: "2024-11-21T08:06:26.667",
         metrics: "{\"cvssMetricV31\": [{\"source\": \"security@vmware.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}]}",
         published: "2023-07-18T16:15:11.753",
         references: "[{\"url\": \"https://spring.io/security/cve-2023-34035\", \"source\": \"security@vmware.com\", \"tags\": [\"Exploit\", \"Vendor Advisory\"]}, {\"url\": \"https://spring.io/security/cve-2023-34035\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Vendor Advisory\"]}]",
         sourceIdentifier: "security@vmware.com",
         vulnStatus: "Modified",
         weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-863\"}]}]",
      },
      nvd: "{\"cve\":{\"id\":\"CVE-2023-34035\",\"sourceIdentifier\":\"security@vmware.com\",\"published\":\"2023-07-18T16:15:11.753\",\"lastModified\":\"2024-11-21T08:06:26.667\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s DispatcherServlet. (DispatcherServlet is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.)\\n\\nSpecifically, an application is vulnerable when all of the following are true:\\n\\n  *  Spring MVC is on the classpath\\n  *  Spring Security is securing more than one servlet in a single application (one of them being Spring MVC’s DispatcherServlet)\\n  *  The application uses requestMatchers(String) to refer to endpoints that are not Spring MVC endpoints\\n\\n\\nAn application is not vulnerable if any of the following is true:\\n\\n  *  The application does not have Spring MVC on the classpath\\n  *  The application secures no servlets other than Spring MVC’s DispatcherServlet\\n  *  The application uses requestMatchers(String) only for Spring MVC endpoints\\n\\n\\n\\n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@vmware.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":3.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.8.0\",\"versionEndExcluding\":\"5.8.5\",\"matchCriteriaId\":\"C459A8B6-D5BD-4504-90DF-B539AFD4027E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndExcluding\":\"6.0.5\",\"matchCriteriaId\":\"9FC21F29-5A00-49C9-BDBD-F488E6E35AE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1.0\",\"versionEndExcluding\":\"6.1.2\",\"matchCriteriaId\":\"75F8781A-895F-4602-BA07-32BF2DF04CC9\"}]}]}],\"references\":[{\"url\":\"https://spring.io/security/cve-2023-34035\",\"source\":\"security@vmware.com\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://spring.io/security/cve-2023-34035\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://spring.io/security/cve-2023-34035\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T15:54:14.210Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-34035\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-25T15:47:27.642233Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-25T15:47:41.201Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"Spring Security\", \"versions\": [{\"status\": \"affected\", \"version\": \"Spring Security 5.8.0 to 5.8.4, Spring Security 6.0.0 to 6.0.4, Spring Security 6.1.0 to 6.1.1\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://spring.io/security/cve-2023-34035\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Spring Security versions 5.8\\u00a0prior to 5.8.5, 6.0\\u00a0prior to 6.0.5,\\u00a0and 6.1\\u00a0prior to 6.1.2\\u00a0could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String)\\u00a0and multiple servlets, one of them being Spring MVC\\u2019s DispatcherServlet.\\u00a0(DispatcherServlet\\u00a0is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.)\\n\\nSpecifically, an application is vulnerable when all of the following are true:\\n\\n  *  Spring MVC is on the classpath\\n  *  Spring Security is securing more than one servlet in a single application (one of them being Spring MVC\\u2019s DispatcherServlet)\\n  *  The application uses requestMatchers(String)\\u00a0to refer to endpoints that are not Spring MVC endpoints\\n\\n\\nAn application is not vulnerable if any of the following is true:\\n\\n  *  The application does not have Spring MVC on the classpath\\n  *  The application secures no servlets other than Spring MVC\\u2019s DispatcherServlet\\n  *  The application uses requestMatchers(String)\\u00a0only for Spring MVC endpoints\\n\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"<span style=\\\"background-color: rgb(255, 255, 255);\\\">Spring Security versions </span><strong>5.8</strong><span style=\\\"background-color: rgb(255, 255, 255);\\\">&nbsp;prior to </span><strong>5.8.5</strong><span style=\\\"background-color: rgb(255, 255, 255);\\\">, </span><strong>6.0</strong><span style=\\\"background-color: rgb(255, 255, 255);\\\">&nbsp;prior to </span><strong>6.0.5,</strong><span style=\\\"background-color: rgb(255, 255, 255);\\\">&nbsp;and </span><strong>6.1</strong><span style=\\\"background-color: rgb(255, 255, 255);\\\">&nbsp;prior to </span><strong>6.1.2</strong><span style=\\\"background-color: rgb(255, 255, 255);\\\">&nbsp;could be susceptible to authorization rule misconfiguration if the application uses </span><code>requestMatchers(String)</code><span style=\\\"background-color: rgb(255, 255, 255);\\\">&nbsp;and multiple servlets, one of them being Spring MVC\\u2019s DispatcherServlet.&nbsp;<span style=\\\"background-color: rgb(255, 255, 255);\\\">(</span><code>DispatcherServlet</code><span style=\\\"background-color: rgb(255, 255, 255);\\\">&nbsp;is a Spring MVC component that maps HTTP endpoints to methods on </span><code>@Controller</code><span style=\\\"background-color: rgb(255, 255, 255);\\\">-annotated classes.)<br></span></span><br><p>Specifically, an application is vulnerable when all of the following are true:</p><ul><li>Spring MVC is on the classpath</li><li>Spring Security is securing more than one servlet in a single application (one of them being Spring MVC\\u2019s <code>DispatcherServlet</code>)</li><li>The application uses <code>requestMatchers(String)</code>&nbsp;to refer to endpoints that are not Spring MVC endpoints</li></ul><p>An application is not vulnerable if any of the following is true:</p><ul><li>The application does not have Spring MVC on the classpath</li><li>The application secures no servlets other than Spring MVC\\u2019s <code>DispatcherServlet</code></li><li>The application uses <code>requestMatchers(String)</code>&nbsp;only for Spring MVC endpoints</li></ul><br>\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Authorization rule misconfiguration\"}]}], \"providerMetadata\": {\"orgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"shortName\": \"vmware\", \"dateUpdated\": \"2023-07-18T15:29:10.091Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2023-34035\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-25T15:47:50.802Z\", \"dateReserved\": \"2023-05-25T17:21:56.200Z\", \"assignerOrgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"datePublished\": \"2023-07-18T15:29:10.091Z\", \"assignerShortName\": \"vmware\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.