CVE-2026-4910 (GCVE-0-2026-4910)
Vulnerability from cvelistv5 – Published: 2026-03-27 03:01 – Updated: 2026-03-27 22:20
VLAI?
Title
Shenzhen Ruiming Technology Streamax Crocus Endpoint RemoteFormat.do sql injection
Summary
A security vulnerability has been detected in Shenzhen Ruiming Technology Streamax Crocus up to 1.3.44. Affected is an unknown function of the file /RemoteFormat.do of the component Endpoint. Such manipulation of the argument State leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Shenzhen Ruiming Technology | Streamax Crocus |
Affected:
1.3.0
Affected: 1.3.1 Affected: 1.3.2 Affected: 1.3.3 Affected: 1.3.4 Affected: 1.3.5 Affected: 1.3.6 Affected: 1.3.7 Affected: 1.3.8 Affected: 1.3.9 Affected: 1.3.10 Affected: 1.3.11 Affected: 1.3.12 Affected: 1.3.13 Affected: 1.3.14 Affected: 1.3.15 Affected: 1.3.16 Affected: 1.3.17 Affected: 1.3.18 Affected: 1.3.19 Affected: 1.3.20 Affected: 1.3.21 Affected: 1.3.22 Affected: 1.3.23 Affected: 1.3.24 Affected: 1.3.25 Affected: 1.3.26 Affected: 1.3.27 Affected: 1.3.28 Affected: 1.3.29 Affected: 1.3.30 Affected: 1.3.31 Affected: 1.3.32 Affected: 1.3.33 Affected: 1.3.34 Affected: 1.3.35 Affected: 1.3.36 Affected: 1.3.37 Affected: 1.3.38 Affected: 1.3.39 Affected: 1.3.40 Affected: 1.3.41 Affected: 1.3.42 Affected: 1.3.43 Affected: 1.3.44 |
Credits
0menc (VulDB User)
VulDB
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-4910",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-27T11:21:46.369521Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-27T11:23:12.368Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"Endpoint"
],
"product": "Streamax Crocus",
"vendor": "Shenzhen Ruiming Technology",
"versions": [
{
"status": "affected",
"version": "1.3.0"
},
{
"status": "affected",
"version": "1.3.1"
},
{
"status": "affected",
"version": "1.3.2"
},
{
"status": "affected",
"version": "1.3.3"
},
{
"status": "affected",
"version": "1.3.4"
},
{
"status": "affected",
"version": "1.3.5"
},
{
"status": "affected",
"version": "1.3.6"
},
{
"status": "affected",
"version": "1.3.7"
},
{
"status": "affected",
"version": "1.3.8"
},
{
"status": "affected",
"version": "1.3.9"
},
{
"status": "affected",
"version": "1.3.10"
},
{
"status": "affected",
"version": "1.3.11"
},
{
"status": "affected",
"version": "1.3.12"
},
{
"status": "affected",
"version": "1.3.13"
},
{
"status": "affected",
"version": "1.3.14"
},
{
"status": "affected",
"version": "1.3.15"
},
{
"status": "affected",
"version": "1.3.16"
},
{
"status": "affected",
"version": "1.3.17"
},
{
"status": "affected",
"version": "1.3.18"
},
{
"status": "affected",
"version": "1.3.19"
},
{
"status": "affected",
"version": "1.3.20"
},
{
"status": "affected",
"version": "1.3.21"
},
{
"status": "affected",
"version": "1.3.22"
},
{
"status": "affected",
"version": "1.3.23"
},
{
"status": "affected",
"version": "1.3.24"
},
{
"status": "affected",
"version": "1.3.25"
},
{
"status": "affected",
"version": "1.3.26"
},
{
"status": "affected",
"version": "1.3.27"
},
{
"status": "affected",
"version": "1.3.28"
},
{
"status": "affected",
"version": "1.3.29"
},
{
"status": "affected",
"version": "1.3.30"
},
{
"status": "affected",
"version": "1.3.31"
},
{
"status": "affected",
"version": "1.3.32"
},
{
"status": "affected",
"version": "1.3.33"
},
{
"status": "affected",
"version": "1.3.34"
},
{
"status": "affected",
"version": "1.3.35"
},
{
"status": "affected",
"version": "1.3.36"
},
{
"status": "affected",
"version": "1.3.37"
},
{
"status": "affected",
"version": "1.3.38"
},
{
"status": "affected",
"version": "1.3.39"
},
{
"status": "affected",
"version": "1.3.40"
},
{
"status": "affected",
"version": "1.3.41"
},
{
"status": "affected",
"version": "1.3.42"
},
{
"status": "affected",
"version": "1.3.43"
},
{
"status": "affected",
"version": "1.3.44"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "0menc (VulDB User)"
},
{
"lang": "en",
"type": "coordinator",
"value": "VulDB"
}
],
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been detected in Shenzhen Ruiming Technology Streamax Crocus up to 1.3.44. Affected is an unknown function of the file /RemoteFormat.do of the component Endpoint. Such manipulation of the argument State leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 7.5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "SQL Injection",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-74",
"description": "Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-27T22:20:39.550Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-353661 | Shenzhen Ruiming Technology Streamax Crocus Endpoint RemoteFormat.do sql injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.353661"
},
{
"name": "VDB-353661 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.353661"
},
{
"name": "Submit #777507 | Shenzhen Ruiming Technology Co., Ltd. Crocus System 1.3.44 SQL Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.777507"
},
{
"tags": [
"exploit"
],
"url": "https://my.feishu.cn/docx/QZU6dXZBBoBeLMx4K28cW1BEnsZ?from=from_copylink"
}
],
"timeline": [
{
"lang": "en",
"time": "2026-03-26T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2026-03-26T01:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2026-03-27T06:18:23.000Z",
"value": "VulDB entry last update"
}
],
"title": "Shenzhen Ruiming Technology Streamax Crocus Endpoint RemoteFormat.do sql injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2026-4910",
"datePublished": "2026-03-27T03:01:03.856Z",
"dateReserved": "2026-03-26T16:10:45.133Z",
"dateUpdated": "2026-03-27T22:20:39.550Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-4910\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2026-03-27T04:16:08.043\",\"lastModified\":\"2026-03-30T13:26:29.793\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A security vulnerability has been detected in Shenzhen Ruiming Technology Streamax Crocus up to 1.3.44. Affected is an unknown function of the file /RemoteFormat.do of the component Endpoint. Such manipulation of the argument State leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de seguridad ha sido detectada en Shenzhen Ruiming Technology Streamax Crocus bis 1.3.44. Afectada es una funci\u00f3n desconocida del archivo /RemoteFormat.do del componente Endpoint. Tal manipulaci\u00f3n del argumento State conduce a inyecci\u00f3n SQL. Es posible lanzar el ataque remotamente. El exploit ha sido divulgado p\u00fablicamente y puede ser utilizado. El proveedor fue contactado tempranamente sobre esta divulgaci\u00f3n pero no respondi\u00f3 de ninguna manera.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":6.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"PROOF_OF_CONCEPT\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":3.4}],\"cvssMetricV2\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-74\"},{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"references\":[{\"url\":\"https://my.feishu.cn/docx/QZU6dXZBBoBeLMx4K28cW1BEnsZ?from=from_copylink\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://vuldb.com/?ctiid.353661\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://vuldb.com/?id.353661\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://vuldb.com/?submit.777507\",\"source\":\"cna@vuldb.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-4910\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-27T11:21:46.369521Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-27T11:23:00.690Z\"}}], \"cna\": {\"title\": \"Shenzhen Ruiming Technology Streamax Crocus Endpoint RemoteFormat.do sql injection\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"0menc (VulDB User)\"}, {\"lang\": \"en\", \"type\": \"coordinator\", \"value\": \"VulDB\"}], \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 6.9, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P\"}}, {\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R\"}}, {\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R\"}}, {\"cvssV2_0\": {\"version\": \"2.0\", \"baseScore\": 7.5, \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR\"}}], \"affected\": [{\"vendor\": \"Shenzhen Ruiming Technology\", \"modules\": [\"Endpoint\"], \"product\": \"Streamax Crocus\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.3.0\"}, {\"status\": \"affected\", \"version\": \"1.3.1\"}, {\"status\": \"affected\", \"version\": \"1.3.2\"}, {\"status\": \"affected\", \"version\": \"1.3.3\"}, {\"status\": \"affected\", \"version\": \"1.3.4\"}, {\"status\": \"affected\", \"version\": \"1.3.5\"}, {\"status\": \"affected\", \"version\": \"1.3.6\"}, {\"status\": \"affected\", \"version\": \"1.3.7\"}, {\"status\": \"affected\", \"version\": \"1.3.8\"}, {\"status\": \"affected\", \"version\": \"1.3.9\"}, {\"status\": \"affected\", \"version\": \"1.3.10\"}, {\"status\": \"affected\", \"version\": \"1.3.11\"}, {\"status\": \"affected\", \"version\": \"1.3.12\"}, {\"status\": \"affected\", \"version\": \"1.3.13\"}, {\"status\": \"affected\", \"version\": \"1.3.14\"}, {\"status\": \"affected\", \"version\": \"1.3.15\"}, {\"status\": \"affected\", \"version\": \"1.3.16\"}, {\"status\": \"affected\", \"version\": \"1.3.17\"}, {\"status\": \"affected\", \"version\": \"1.3.18\"}, {\"status\": \"affected\", \"version\": \"1.3.19\"}, {\"status\": \"affected\", \"version\": \"1.3.20\"}, {\"status\": \"affected\", \"version\": \"1.3.21\"}, {\"status\": \"affected\", \"version\": \"1.3.22\"}, {\"status\": \"affected\", \"version\": \"1.3.23\"}, {\"status\": \"affected\", \"version\": \"1.3.24\"}, {\"status\": \"affected\", \"version\": \"1.3.25\"}, {\"status\": \"affected\", \"version\": \"1.3.26\"}, {\"status\": \"affected\", \"version\": \"1.3.27\"}, {\"status\": \"affected\", \"version\": \"1.3.28\"}, {\"status\": \"affected\", \"version\": \"1.3.29\"}, {\"status\": \"affected\", \"version\": \"1.3.30\"}, {\"status\": \"affected\", \"version\": \"1.3.31\"}, {\"status\": \"affected\", \"version\": \"1.3.32\"}, {\"status\": \"affected\", \"version\": \"1.3.33\"}, {\"status\": \"affected\", \"version\": \"1.3.34\"}, {\"status\": \"affected\", \"version\": \"1.3.35\"}, {\"status\": \"affected\", \"version\": \"1.3.36\"}, {\"status\": \"affected\", \"version\": \"1.3.37\"}, {\"status\": \"affected\", \"version\": \"1.3.38\"}, {\"status\": \"affected\", \"version\": \"1.3.39\"}, {\"status\": \"affected\", \"version\": \"1.3.40\"}, {\"status\": \"affected\", \"version\": \"1.3.41\"}, {\"status\": \"affected\", \"version\": \"1.3.42\"}, {\"status\": \"affected\", \"version\": \"1.3.43\"}, {\"status\": \"affected\", \"version\": \"1.3.44\"}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-03-26T00:00:00.000Z\", \"value\": \"Advisory disclosed\"}, {\"lang\": \"en\", \"time\": \"2026-03-26T01:00:00.000Z\", \"value\": \"VulDB entry created\"}, {\"lang\": \"en\", \"time\": \"2026-03-27T06:18:23.000Z\", \"value\": \"VulDB entry last update\"}], \"references\": [{\"url\": \"https://vuldb.com/?id.353661\", \"name\": \"VDB-353661 | Shenzhen Ruiming Technology Streamax Crocus Endpoint RemoteFormat.do sql injection\", \"tags\": [\"vdb-entry\", \"technical-description\"]}, {\"url\": \"https://vuldb.com/?ctiid.353661\", \"name\": \"VDB-353661 | CTI Indicators (IOB, IOC, TTP, IOA)\", \"tags\": [\"signature\", \"permissions-required\"]}, {\"url\": \"https://vuldb.com/?submit.777507\", \"name\": \"Submit #777507 | Shenzhen Ruiming Technology Co., Ltd. Crocus System 1.3.44 SQL Injection\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://my.feishu.cn/docx/QZU6dXZBBoBeLMx4K28cW1BEnsZ?from=from_copylink\", \"tags\": [\"exploit\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A security vulnerability has been detected in Shenzhen Ruiming Technology Streamax Crocus up to 1.3.44. Affected is an unknown function of the file /RemoteFormat.do of the component Endpoint. Such manipulation of the argument State leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-89\", \"description\": \"SQL Injection\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-74\", \"description\": \"Injection\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2026-03-27T22:20:39.550Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-4910\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-27T22:20:39.550Z\", \"dateReserved\": \"2026-03-26T16:10:45.133Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2026-03-27T03:01:03.856Z\", \"assignerShortName\": \"VulDB\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…