CVE-2025-6092 (GCVE-0-2025-6092)
Vulnerability from cvelistv5 – Published: 2025-06-15 17:31 – Updated: 2025-06-16 16:33
VLAI?
Title
comfyanonymous comfyui Incomplete Fix CVE-2024-10099 image cross site scripting
Summary
A vulnerability was found in comfyanonymous comfyui up to 0.3.39. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /upload/image of the component Incomplete Fix CVE-2024-10099. The manipulation of the argument image leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| comfyanonymous | comfyui |
Affected:
0.3.0
Affected: 0.3.1 Affected: 0.3.2 Affected: 0.3.3 Affected: 0.3.4 Affected: 0.3.5 Affected: 0.3.6 Affected: 0.3.7 Affected: 0.3.8 Affected: 0.3.9 Affected: 0.3.10 Affected: 0.3.11 Affected: 0.3.12 Affected: 0.3.13 Affected: 0.3.14 Affected: 0.3.15 Affected: 0.3.16 Affected: 0.3.17 Affected: 0.3.18 Affected: 0.3.19 Affected: 0.3.20 Affected: 0.3.21 Affected: 0.3.22 Affected: 0.3.23 Affected: 0.3.24 Affected: 0.3.25 Affected: 0.3.26 Affected: 0.3.27 Affected: 0.3.28 Affected: 0.3.29 Affected: 0.3.30 Affected: 0.3.31 Affected: 0.3.32 Affected: 0.3.33 Affected: 0.3.34 Affected: 0.3.35 Affected: 0.3.36 Affected: 0.3.37 Affected: 0.3.38 Affected: 0.3.39 |
Credits
Gavin Zhong (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6092",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-16T16:33:09.574670Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-16T16:33:21.100Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"Incomplete Fix CVE-2024-10099"
],
"product": "comfyui",
"vendor": "comfyanonymous",
"versions": [
{
"status": "affected",
"version": "0.3.0"
},
{
"status": "affected",
"version": "0.3.1"
},
{
"status": "affected",
"version": "0.3.2"
},
{
"status": "affected",
"version": "0.3.3"
},
{
"status": "affected",
"version": "0.3.4"
},
{
"status": "affected",
"version": "0.3.5"
},
{
"status": "affected",
"version": "0.3.6"
},
{
"status": "affected",
"version": "0.3.7"
},
{
"status": "affected",
"version": "0.3.8"
},
{
"status": "affected",
"version": "0.3.9"
},
{
"status": "affected",
"version": "0.3.10"
},
{
"status": "affected",
"version": "0.3.11"
},
{
"status": "affected",
"version": "0.3.12"
},
{
"status": "affected",
"version": "0.3.13"
},
{
"status": "affected",
"version": "0.3.14"
},
{
"status": "affected",
"version": "0.3.15"
},
{
"status": "affected",
"version": "0.3.16"
},
{
"status": "affected",
"version": "0.3.17"
},
{
"status": "affected",
"version": "0.3.18"
},
{
"status": "affected",
"version": "0.3.19"
},
{
"status": "affected",
"version": "0.3.20"
},
{
"status": "affected",
"version": "0.3.21"
},
{
"status": "affected",
"version": "0.3.22"
},
{
"status": "affected",
"version": "0.3.23"
},
{
"status": "affected",
"version": "0.3.24"
},
{
"status": "affected",
"version": "0.3.25"
},
{
"status": "affected",
"version": "0.3.26"
},
{
"status": "affected",
"version": "0.3.27"
},
{
"status": "affected",
"version": "0.3.28"
},
{
"status": "affected",
"version": "0.3.29"
},
{
"status": "affected",
"version": "0.3.30"
},
{
"status": "affected",
"version": "0.3.31"
},
{
"status": "affected",
"version": "0.3.32"
},
{
"status": "affected",
"version": "0.3.33"
},
{
"status": "affected",
"version": "0.3.34"
},
{
"status": "affected",
"version": "0.3.35"
},
{
"status": "affected",
"version": "0.3.36"
},
{
"status": "affected",
"version": "0.3.37"
},
{
"status": "affected",
"version": "0.3.38"
},
{
"status": "affected",
"version": "0.3.39"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Gavin Zhong (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in comfyanonymous comfyui up to 0.3.39. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /upload/image of the component Incomplete Fix CVE-2024-10099. The manipulation of the argument image leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In comfyanonymous comfyui bis 0.3.39 wurde eine problematische Schwachstelle ausgemacht. Hierbei betrifft es unbekannten Programmcode der Datei /upload/image der Komponente Incomplete Fix CVE-2024-10099. Mittels dem Manipulieren des Arguments image mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "Cross Site Scripting",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "Code Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-15T17:31:05.460Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-312559 | comfyanonymous comfyui Incomplete Fix CVE-2024-10099 image cross site scripting",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.312559"
},
{
"name": "VDB-312559 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.312559"
},
{
"name": "Submit #588224 | comfyui 0.3.39 Cross Site Scripting",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.588224"
},
{
"tags": [
"exploit"
],
"url": "https://gist.github.com/superboy-zjc/96f0d56da584d840ba18355cbea96ac4"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-06-14T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-06-15T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-06-15T01:14:03.000Z",
"value": "VulDB entry last update"
}
],
"title": "comfyanonymous comfyui Incomplete Fix CVE-2024-10099 image cross site scripting"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-6092",
"datePublished": "2025-06-15T17:31:05.460Z",
"dateReserved": "2025-06-14T23:08:26.688Z",
"dateUpdated": "2025-06-16T16:33:21.100Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-6092\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2025-06-15T18:15:19.037\",\"lastModified\":\"2025-06-16T12:32:18.840\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was found in comfyanonymous comfyui up to 0.3.39. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /upload/image of the component Incomplete Fix CVE-2024-10099. The manipulation of the argument image leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una vulnerabilidad en comfyui de comfyanonymous hasta la versi\u00f3n 0.3.39. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /upload/image del componente Incomplete Fix CVE-2024-10099. La manipulaci\u00f3n del argumento \\\"image\\\" provoca cross-site-scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"PASSIVE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"PROOF_OF_CONCEPT\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"},{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"references\":[{\"url\":\"https://gist.github.com/superboy-zjc/96f0d56da584d840ba18355cbea96ac4\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://vuldb.com/?ctiid.312559\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://vuldb.com/?id.312559\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://vuldb.com/?submit.588224\",\"source\":\"cna@vuldb.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-6092\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-16T16:33:09.574670Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-16T16:33:17.383Z\"}}], \"cna\": {\"title\": \"comfyanonymous comfyui Incomplete Fix CVE-2024-10099 image cross site scripting\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Gavin Zhong (VulDB User)\"}], \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P\"}}, {\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R\"}}, {\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R\"}}, {\"cvssV2_0\": {\"version\": \"2.0\", \"baseScore\": 5, \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR\"}}], \"affected\": [{\"vendor\": \"comfyanonymous\", \"modules\": [\"Incomplete Fix CVE-2024-10099\"], \"product\": \"comfyui\", \"versions\": [{\"status\": \"affected\", \"version\": \"0.3.0\"}, {\"status\": \"affected\", \"version\": \"0.3.1\"}, {\"status\": \"affected\", \"version\": \"0.3.2\"}, {\"status\": \"affected\", \"version\": \"0.3.3\"}, {\"status\": \"affected\", \"version\": \"0.3.4\"}, {\"status\": \"affected\", \"version\": \"0.3.5\"}, {\"status\": \"affected\", \"version\": \"0.3.6\"}, {\"status\": \"affected\", \"version\": \"0.3.7\"}, {\"status\": \"affected\", \"version\": \"0.3.8\"}, {\"status\": \"affected\", \"version\": \"0.3.9\"}, {\"status\": \"affected\", \"version\": \"0.3.10\"}, {\"status\": \"affected\", \"version\": \"0.3.11\"}, {\"status\": \"affected\", \"version\": \"0.3.12\"}, {\"status\": \"affected\", \"version\": \"0.3.13\"}, {\"status\": \"affected\", \"version\": \"0.3.14\"}, {\"status\": \"affected\", \"version\": \"0.3.15\"}, {\"status\": \"affected\", \"version\": \"0.3.16\"}, {\"status\": \"affected\", \"version\": \"0.3.17\"}, {\"status\": \"affected\", \"version\": \"0.3.18\"}, {\"status\": \"affected\", \"version\": \"0.3.19\"}, {\"status\": \"affected\", \"version\": \"0.3.20\"}, {\"status\": \"affected\", \"version\": \"0.3.21\"}, {\"status\": \"affected\", \"version\": \"0.3.22\"}, {\"status\": \"affected\", \"version\": \"0.3.23\"}, {\"status\": \"affected\", \"version\": \"0.3.24\"}, {\"status\": \"affected\", \"version\": \"0.3.25\"}, {\"status\": \"affected\", \"version\": \"0.3.26\"}, {\"status\": \"affected\", \"version\": \"0.3.27\"}, {\"status\": \"affected\", \"version\": \"0.3.28\"}, {\"status\": \"affected\", \"version\": \"0.3.29\"}, {\"status\": \"affected\", \"version\": \"0.3.30\"}, {\"status\": \"affected\", \"version\": \"0.3.31\"}, {\"status\": \"affected\", \"version\": \"0.3.32\"}, {\"status\": \"affected\", \"version\": \"0.3.33\"}, {\"status\": \"affected\", \"version\": \"0.3.34\"}, {\"status\": \"affected\", \"version\": \"0.3.35\"}, {\"status\": \"affected\", \"version\": \"0.3.36\"}, {\"status\": \"affected\", \"version\": \"0.3.37\"}, {\"status\": \"affected\", \"version\": \"0.3.38\"}, {\"status\": \"affected\", \"version\": \"0.3.39\"}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-06-14T02:00:00.000Z\", \"value\": \"VulDB entry created\"}, {\"lang\": \"en\", \"time\": \"2025-06-15T00:00:00.000Z\", \"value\": \"Advisory disclosed\"}, {\"lang\": \"en\", \"time\": \"2025-06-15T01:14:03.000Z\", \"value\": \"VulDB entry last update\"}], \"references\": [{\"url\": \"https://vuldb.com/?id.312559\", \"name\": \"VDB-312559 | comfyanonymous comfyui Incomplete Fix CVE-2024-10099 image cross site scripting\", \"tags\": [\"vdb-entry\", \"technical-description\"]}, {\"url\": \"https://vuldb.com/?ctiid.312559\", \"name\": \"VDB-312559 | CTI Indicators (IOB, IOC, TTP, IOA)\", \"tags\": [\"signature\", \"permissions-required\"]}, {\"url\": \"https://vuldb.com/?submit.588224\", \"name\": \"Submit #588224 | comfyui 0.3.39 Cross Site Scripting\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://gist.github.com/superboy-zjc/96f0d56da584d840ba18355cbea96ac4\", \"tags\": [\"exploit\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability was found in comfyanonymous comfyui up to 0.3.39. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /upload/image of the component Incomplete Fix CVE-2024-10099. The manipulation of the argument image leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\"}, {\"lang\": \"de\", \"value\": \"In comfyanonymous comfyui bis 0.3.39 wurde eine problematische Schwachstelle ausgemacht. Hierbei betrifft es unbekannten Programmcode der Datei /upload/image der Komponente Incomplete Fix CVE-2024-10099. Mittels dem Manipulieren des Arguments image mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \\u00fcber das Netzwerk. Der Exploit steht zur \\u00f6ffentlichen Verf\\u00fcgung.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"Cross Site Scripting\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-94\", \"description\": \"Code Injection\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2025-06-15T17:31:05.460Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-6092\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-16T16:33:21.100Z\", \"dateReserved\": \"2025-06-14T23:08:26.688Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2025-06-15T17:31:05.460Z\", \"assignerShortName\": \"VulDB\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…