CVE-2024-11983 (GCVE-0-2024-11983)
Vulnerability from cvelistv5 – Published: 2024-11-29 06:57 – Updated: 2024-11-29 14:10
VLAI?
Summary
Certain models of routers from Billion Electric has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject arbitrary system commands into a specific SSH function and execute them on the device.
Severity ?
7.2 (High)
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Billion Electric | M100 |
Affected:
1.04.1.592.* , < 1.04.1.592.8
(custom)
Affected: 1.04.1.613.* , < 1.04.1.613.13 (custom) Affected: 1.04.1.* , < 1.04.1.675 (custom) |
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:billion_electric:m100:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "m100",
"vendor": "billion_electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.*",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:billion_electric:m150:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "m150",
"vendor": "billion_electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.* \u003c",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:billion_electric:m120n:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "m120n",
"vendor": "billion_electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.* \u003c",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:billion_electric:m500:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "m500",
"vendor": "billion_electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.* \u003c",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-11983",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-29T13:57:51.182205Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-29T14:10:39.561Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "M100",
"vendor": "Billion Electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.*",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "M150",
"vendor": "Billion Electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.*",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "M120N",
"vendor": "Billion Electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.*",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "M500",
"vendor": "Billion Electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.*",
"versionType": "custom"
}
]
}
],
"datePublic": "2024-11-29T06:53:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Certain models of routers from Billion Electric has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject arbitrary system commands into a specific SSH function and execute them on the device."
}
],
"value": "Certain models of routers from Billion Electric has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject arbitrary system commands into a specific SSH function and execute them on the device."
}
],
"impacts": [
{
"capecId": "CAPEC-88",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-88 OS Command Injection"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-29T06:57:24.047Z",
"orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
"shortName": "twcert"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://www.twcert.org.tw/tw/cp-132-8279-bf67e-1.html"
},
{
"tags": [
"third-party-advisory"
],
"url": "https://www.twcert.org.tw/en/cp-139-8280-ae6e1-2.html"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "For firmware version 1.04.1.592.x, please update to 1.04.1.592.8 or later.\u003cbr\u003eFor firmware version 1.04.1.613.x, please update to 1.04.1.613.13 or later.\u003cbr\u003eFor all other firmware version 1.04.1.x, please update to 1.04.1.675 or later.\u003cbr\u003e"
}
],
"value": "For firmware version 1.04.1.592.x, please update to 1.04.1.592.8 or later.\nFor firmware version 1.04.1.613.x, please update to 1.04.1.613.13 or later.\nFor all other firmware version 1.04.1.x, please update to 1.04.1.675 or later."
}
],
"source": {
"advisory": "TVN-202411028",
"discovery": "EXTERNAL"
},
"title": "Billion Electric router - OS Command Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
"assignerShortName": "twcert",
"cveId": "CVE-2024-11983",
"datePublished": "2024-11-29T06:57:24.047Z",
"dateReserved": "2024-11-29T01:52:22.084Z",
"dateUpdated": "2024-11-29T14:10:39.561Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Certain models of routers from Billion Electric has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject arbitrary system commands into a specific SSH function and execute them on the device.\"}, {\"lang\": \"es\", \"value\": \"Ciertos modelos de enrutadores de Billion Electric tienen una vulnerabilidad de inyecci\\u00f3n de comandos del sistema operativo, lo que permite a atacantes remotos con privilegios de administrador inyectar comandos de sistema arbitrarios en una funci\\u00f3n SSH espec\\u00edfica y ejecutarlos en el dispositivo.\"}]",
"id": "CVE-2024-11983",
"lastModified": "2024-11-29T08:15:04.733",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"twcert@cert.org.tw\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.9}]}",
"published": "2024-11-29T08:15:04.733",
"references": "[{\"url\": \"https://www.twcert.org.tw/en/cp-139-8280-ae6e1-2.html\", \"source\": \"twcert@cert.org.tw\"}, {\"url\": \"https://www.twcert.org.tw/tw/cp-132-8279-bf67e-1.html\", \"source\": \"twcert@cert.org.tw\"}]",
"sourceIdentifier": "twcert@cert.org.tw",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"twcert@cert.org.tw\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-78\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-11983\",\"sourceIdentifier\":\"twcert@cert.org.tw\",\"published\":\"2024-11-29T08:15:04.733\",\"lastModified\":\"2024-11-29T08:15:04.733\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain models of routers from Billion Electric has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject arbitrary system commands into a specific SSH function and execute them on the device.\"},{\"lang\":\"es\",\"value\":\"Ciertos modelos de enrutadores de Billion Electric tienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo, lo que permite a atacantes remotos con privilegios de administrador inyectar comandos de sistema arbitrarios en una funci\u00f3n SSH espec\u00edfica y ejecutarlos en el dispositivo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"twcert@cert.org.tw\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"twcert@cert.org.tw\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"references\":[{\"url\":\"https://www.twcert.org.tw/en/cp-139-8280-ae6e1-2.html\",\"source\":\"twcert@cert.org.tw\"},{\"url\":\"https://www.twcert.org.tw/tw/cp-132-8279-bf67e-1.html\",\"source\":\"twcert@cert.org.tw\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-11983\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-29T13:57:51.182205Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:billion_electric:m100:*:*:*:*:*:*:*:*\"], \"vendor\": \"billion_electric\", \"product\": \"m100\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.*\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:billion_electric:m150:*:*:*:*:*:*:*:*\"], \"vendor\": \"billion_electric\", \"product\": \"m150\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.* \u003c\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:billion_electric:m120n:*:*:*:*:*:*:*:*\"], \"vendor\": \"billion_electric\", \"product\": \"m120n\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.* \u003c\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:billion_electric:m500:*:*:*:*:*:*:*:*\"], \"vendor\": \"billion_electric\", \"product\": \"m500\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.* \u003c\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-29T14:09:28.088Z\"}}], \"cna\": {\"title\": \"Billion Electric router - OS Command Injection\", \"source\": {\"advisory\": \"TVN-202411028\", \"discovery\": \"EXTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-88\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-88 OS Command Injection\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Billion Electric\", \"product\": \"M100\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.*\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Billion Electric\", \"product\": \"M150\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.*\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Billion Electric\", \"product\": \"M120N\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.*\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Billion Electric\", \"product\": \"M500\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.*\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"For firmware version 1.04.1.592.x, please update to 1.04.1.592.8 or later.\\nFor firmware version 1.04.1.613.x, please update to 1.04.1.613.13 or later.\\nFor all other firmware version 1.04.1.x, please update to 1.04.1.675 or later.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"For firmware version 1.04.1.592.x, please update to 1.04.1.592.8 or later.\u003cbr\u003eFor firmware version 1.04.1.613.x, please update to 1.04.1.613.13 or later.\u003cbr\u003eFor all other firmware version 1.04.1.x, please update to 1.04.1.675 or later.\u003cbr\u003e\", \"base64\": false}]}], \"datePublic\": \"2024-11-29T06:53:00.000Z\", \"references\": [{\"url\": \"https://www.twcert.org.tw/tw/cp-132-8279-bf67e-1.html\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://www.twcert.org.tw/en/cp-139-8280-ae6e1-2.html\", \"tags\": [\"third-party-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Certain models of routers from Billion Electric has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject arbitrary system commands into a specific SSH function and execute them on the device.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Certain models of routers from Billion Electric has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject arbitrary system commands into a specific SSH function and execute them on the device.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-78\", \"description\": \"CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e\", \"shortName\": \"twcert\", \"dateUpdated\": \"2024-11-29T06:57:24.047Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-11983\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-29T14:10:39.561Z\", \"dateReserved\": \"2024-11-29T01:52:22.084Z\", \"assignerOrgId\": \"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e\", \"datePublished\": \"2024-11-29T06:57:24.047Z\", \"assignerShortName\": \"twcert\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…