CVE-2025-2629 (GCVE-0-2025-2629)

Vulnerability from cvelistv5 – Published: 2025-04-09 18:45 – Updated: 2025-04-09 18:58
VLAI?
Summary
There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
  • CWE-427 - Uncontrolled Search Path Element
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , < 22.3.4 (semver)
Affected: 23.1.0 , < 223.3.5 (semver)
Affected: 24.1.0 , < 24.3.2 (sem)
Affected: 25.1.0 , < 25.1.1 (semver)
Create a notification for this product.
Credits
Mike Palafox from BLOOMY®
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2629",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T18:58:34.817569Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T18:58:49.944Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThan": "22.3.4",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "223.3.5",
              "status": "affected",
              "version": "23.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "24.3.2",
              "status": "affected",
              "version": "24.1.0",
              "versionType": "sem"
            },
            {
              "lessThan": "25.1.1",
              "status": "affected",
              "version": "25.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Mike Palafox from BLOOMY\u00ae"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThere is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-471",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-471 Search Order Hijacking"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427 Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-09T18:45:35.434Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/dll-hijacking-vulnerability-in-ni-labview-when-loading-ni-error-reporting.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "DLL Hijacking Vulnerability in NI LabVIEW When Loading NI Error Reporting",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-2629",
    "datePublished": "2025-04-09T18:45:35.434Z",
    "dateReserved": "2025-03-21T21:07:28.841Z",
    "dateUpdated": "2025-04-09T18:58:49.944Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-2629\",\"sourceIdentifier\":\"security@ni.com\",\"published\":\"2025-04-09T19:15:48.320\",\"lastModified\":\"2025-08-18T19:47:18.057\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de secuestro de DLL debido a una ruta de b\u00fasqueda no controlada en NI LabVIEW al cargar NI Error Reporting. Esta vulnerabilidad puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla correctamente, un atacante debe insertar una DLL maliciosa en la ruta de b\u00fasqueda no controlada. Esta vulnerabilidad afecta a NI LabVIEW 2025 Q1 y versiones anteriores.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security@ni.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"PASSIVE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"security@ni.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.3,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@ni.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-427\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2021\",\"matchCriteriaId\":\"807AE6D5-8096-47A2-A47D-1A5EFC85652D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D12D6CF-802F-47BA-ADF9-9E52C071BD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*\",\"matchCriteriaId\":\"340F61E5-D1ED-4C29-A894-8BC5C5B90ACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"52CC3023-4913-40BA-B74C-786F32DC7551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC150E98-5889-4A65-84B8-E4871091D104\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*\",\"matchCriteriaId\":\"85B3D429-4F3D-44CC-9304-837FB6D7E2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7DD2022-CFB7-4F38-B459-C1AFB55B5B68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*\",\"matchCriteriaId\":\"18AB0B07-72FE-4861-B69D-AD2E87C5382E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"91928C9C-F094-4EE4-9FBE-2B7956D68E6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"044C4B51-C641-41F2-ACA0-834C99D63285\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*\",\"matchCriteriaId\":\"26EEE5E3-AD37-4832-A66C-5F8F7A478F30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DC20B17-C582-42C4-9780-5DC61B4AED91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*\",\"matchCriteriaId\":\"329575A0-F12E-478B-9A83-F747D6A161AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"953E8FD0-4420-4592-B696-C377D4EE0CA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D99DCCD-511E-482E-8307-24382D1B621B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"600A4905-B888-454F-9DF6-1C09FB71DBE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD79D082-AFF5-42CB-9D6C-12CF9A59D205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0991CF-642F-46D2-9C47-9540347DC074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D776E6DE-2635-4172-B08D-B7FB2D1048F9\"}]}]}],\"references\":[{\"url\":\"https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/dll-hijacking-vulnerability-in-ni-labview-when-loading-ni-error-reporting.html\",\"source\":\"security@ni.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-2629\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-09T18:58:34.817569Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-09T18:58:44.316Z\"}}], \"cna\": {\"title\": \"DLL Hijacking Vulnerability in NI LabVIEW When Loading NI Error Reporting\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Mike Palafox from BLOOMY\\u00ae\"}], \"impacts\": [{\"capecId\": \"CAPEC-471\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-471 Search Order Hijacking\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 7, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"PASSIVE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"LOW\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"NI\", \"product\": \"LabVIEW\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"22.3.4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"23.1.0\", \"lessThan\": \"223.3.5\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"24.1.0\", \"lessThan\": \"24.3.2\", \"versionType\": \"sem\"}, {\"status\": \"affected\", \"version\": \"25.1.0\", \"lessThan\": \"25.1.1\", \"versionType\": \"semver\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/dll-hijacking-vulnerability-in-ni-labview-when-loading-ni-error-reporting.html\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eThere is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/span\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-427\", \"description\": \"CWE-427 Uncontrolled Search Path Element\"}]}], \"providerMetadata\": {\"orgId\": \"bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4\", \"shortName\": \"NI\", \"dateUpdated\": \"2025-04-09T18:45:35.434Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-2629\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-09T18:58:49.944Z\", \"dateReserved\": \"2025-03-21T21:07:28.841Z\", \"assignerOrgId\": \"bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4\", \"datePublished\": \"2025-04-09T18:45:35.434Z\", \"assignerShortName\": \"NI\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…