gsd-2019-10744
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
Aliases
Aliases



{
   GSD: {
      alias: "CVE-2019-10744",
      description: "Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.",
      id: "GSD-2019-10744",
      references: [
         "https://www.suse.com/security/cve/CVE-2019-10744.html",
         "https://access.redhat.com/errata/RHSA-2021:5134",
         "https://access.redhat.com/errata/RHSA-2020:2819",
         "https://access.redhat.com/errata/RHSA-2020:2362",
         "https://access.redhat.com/errata/RHSA-2019:3024",
         "https://access.redhat.com/errata/RHSA-2022:5101",
      ],
   },
   gsd: {
      metadata: {
         exploitCode: "unknown",
         remediation: "unknown",
         reportConfidence: "confirmed",
         type: "vulnerability",
      },
      osvSchema: {
         aliases: [
            "CVE-2019-10744",
         ],
         details: "Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.",
         id: "GSD-2019-10744",
         modified: "2023-12-13T01:23:57.424291Z",
         schema_version: "1.4.0",
      },
   },
   namespaces: {
      "cve.org": {
         CVE_data_meta: {
            ASSIGNER: "report@snyk.io",
            ID: "CVE-2019-10744",
            STATE: "PUBLIC",
         },
         affects: {
            vendor: {
               vendor_data: [
                  {
                     product: {
                        product_data: [
                           {
                              product_name: "lodash",
                              version: {
                                 version_data: [
                                    {
                                       version_value: "All versions prior to 4.17.12",
                                    },
                                 ],
                              },
                           },
                        ],
                     },
                     vendor_name: "Snyk",
                  },
               ],
            },
         },
         data_format: "MITRE",
         data_type: "CVE",
         data_version: "4.0",
         description: {
            description_data: [
               {
                  lang: "eng",
                  value: "Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.",
               },
            ],
         },
         problemtype: {
            problemtype_data: [
               {
                  description: [
                     {
                        lang: "eng",
                        value: "Prototype Pollution",
                     },
                  ],
               },
            ],
         },
         references: {
            reference_data: [
               {
                  name: "RHSA-2019:3024",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2019:3024",
               },
               {
                  name: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  refsource: "MISC",
                  url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
               },
               {
                  name: "https://snyk.io/vuln/SNYK-JS-LODASH-450202",
                  refsource: "CONFIRM",
                  url: "https://snyk.io/vuln/SNYK-JS-LODASH-450202",
               },
               {
                  name: "https://security.netapp.com/advisory/ntap-20191004-0005/",
                  refsource: "CONFIRM",
                  url: "https://security.netapp.com/advisory/ntap-20191004-0005/",
               },
               {
                  name: "https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS",
                  refsource: "CONFIRM",
                  url: "https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS",
               },
               {
                  name: "https://www.oracle.com/security-alerts/cpujan2021.html",
                  refsource: "MISC",
                  url: "https://www.oracle.com/security-alerts/cpujan2021.html",
               },
            ],
         },
      },
      "gitlab.com": {
         advisories: [
            {
               affected_range: "<4.17.13",
               affected_versions: "All versions before 4.17.13",
               cvss_v2: "AV:N/AC:L/Au:N/C:N/I:P/A:P",
               cvss_v3: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
               cwe_ids: [
                  "CWE-1035",
                  "CWE-937",
               ],
               date: "2021-08-17",
               description: "Versions of lodash lower than are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.",
               fixed_versions: [
                  "4.17.13",
               ],
               identifier: "CVE-2019-10744",
               identifiers: [
                  "GHSA-jf85-cpcp-j695",
                  "CVE-2019-10744",
               ],
               not_impacted: "All versions starting from 4.17.13",
               package_slug: "npm/lodash-amd",
               pubdate: "2019-07-10",
               solution: "Upgrade to version 4.17.13 or above.",
               title: "Prototype Pollution in lodash",
               urls: [
                  "https://github.com/lodash/lodash/pull/4336",
                  "https://nvd.nist.gov/vuln/detail/CVE-2019-10744",
                  "https://snyk.io/vuln/SNYK-JS-LODASH-450202",
                  "https://www.npmjs.com/advisories/1065",
                  "https://access.redhat.com/errata/RHSA-2019:3024",
                  "https://security.netapp.com/advisory/ntap-20191004-0005/",
                  "https://support.f5.com/csp/article/K47105354?utm_source=f5support&amp;utm_medium=RSS",
                  "https://www.oracle.com/security-alerts/cpujan2021.html",
                  "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  "https://github.com/advisories/GHSA-jf85-cpcp-j695",
               ],
               uuid: "d9547eba-658d-4462-9224-16ecb70f9fca",
            },
            {
               affected_range: "<4.17.14",
               affected_versions: "All versions before 4.17.14",
               cvss_v2: "AV:N/AC:L/Au:N/C:N/I:P/A:P",
               cvss_v3: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
               cwe_ids: [
                  "CWE-1035",
                  "CWE-937",
               ],
               date: "2021-08-17",
               description: "Versions of lodash lower than are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.",
               fixed_versions: [
                  "4.17.14",
               ],
               identifier: "CVE-2019-10744",
               identifiers: [
                  "GHSA-jf85-cpcp-j695",
                  "CVE-2019-10744",
               ],
               not_impacted: "All versions starting from 4.17.14",
               package_slug: "npm/lodash-es",
               pubdate: "2019-07-10",
               solution: "Upgrade to version 4.17.14 or above.",
               title: "Prototype Pollution in lodash",
               urls: [
                  "https://github.com/lodash/lodash/pull/4336",
                  "https://nvd.nist.gov/vuln/detail/CVE-2019-10744",
                  "https://snyk.io/vuln/SNYK-JS-LODASH-450202",
                  "https://www.npmjs.com/advisories/1065",
                  "https://access.redhat.com/errata/RHSA-2019:3024",
                  "https://security.netapp.com/advisory/ntap-20191004-0005/",
                  "https://support.f5.com/csp/article/K47105354?utm_source=f5support&amp;utm_medium=RSS",
                  "https://www.oracle.com/security-alerts/cpujan2021.html",
                  "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  "https://github.com/advisories/GHSA-jf85-cpcp-j695",
               ],
               uuid: "c3616d0c-e7d3-427d-87ef-3f64cd0eea48",
            },
            {
               affected_range: "<4.6.1",
               affected_versions: "All versions before 4.6.1",
               cvss_v2: "AV:N/AC:L/Au:N/C:N/I:P/A:P",
               cvss_v3: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
               cwe_ids: [
                  "CWE-1035",
                  "CWE-937",
               ],
               date: "2021-08-17",
               description: "Versions of lodash lower than are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.",
               fixed_versions: [
                  "4.6.1",
               ],
               identifier: "CVE-2019-10744",
               identifiers: [
                  "GHSA-jf85-cpcp-j695",
                  "CVE-2019-10744",
               ],
               not_impacted: "All versions starting from 4.6.1",
               package_slug: "npm/lodash.defaultsdeep",
               pubdate: "2019-07-10",
               solution: "Upgrade to version 4.6.1 or above.",
               title: "Prototype Pollution in lodash",
               urls: [
                  "https://github.com/lodash/lodash/pull/4336",
                  "https://nvd.nist.gov/vuln/detail/CVE-2019-10744",
                  "https://snyk.io/vuln/SNYK-JS-LODASH-450202",
                  "https://www.npmjs.com/advisories/1065",
                  "https://access.redhat.com/errata/RHSA-2019:3024",
                  "https://security.netapp.com/advisory/ntap-20191004-0005/",
                  "https://support.f5.com/csp/article/K47105354?utm_source=f5support&amp;utm_medium=RSS",
                  "https://www.oracle.com/security-alerts/cpujan2021.html",
                  "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  "https://github.com/advisories/GHSA-jf85-cpcp-j695",
               ],
               uuid: "b44b8ff7-9f98-4799-b079-7ddebcc80fb5",
            },
            {
               affected_range: "<4.6.2",
               affected_versions: "All versions before 4.6.2",
               cvss_v2: "AV:N/AC:L/Au:N/C:N/I:P/A:P",
               cvss_v3: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
               cwe_ids: [
                  "CWE-1035",
                  "CWE-937",
               ],
               date: "2021-08-17",
               description: "Versions of lodash lower than are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.",
               fixed_versions: [
                  "4.6.2",
               ],
               identifier: "CVE-2019-10744",
               identifiers: [
                  "GHSA-jf85-cpcp-j695",
                  "CVE-2019-10744",
               ],
               not_impacted: "All versions starting from 4.6.2",
               package_slug: "npm/lodash.merge",
               pubdate: "2019-07-10",
               solution: "Upgrade to version 4.6.2 or above.",
               title: "Prototype Pollution in lodash",
               urls: [
                  "https://github.com/lodash/lodash/pull/4336",
                  "https://nvd.nist.gov/vuln/detail/CVE-2019-10744",
                  "https://snyk.io/vuln/SNYK-JS-LODASH-450202",
                  "https://www.npmjs.com/advisories/1065",
                  "https://access.redhat.com/errata/RHSA-2019:3024",
                  "https://security.netapp.com/advisory/ntap-20191004-0005/",
                  "https://support.f5.com/csp/article/K47105354?utm_source=f5support&amp;utm_medium=RSS",
                  "https://www.oracle.com/security-alerts/cpujan2021.html",
                  "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  "https://github.com/advisories/GHSA-jf85-cpcp-j695",
               ],
               uuid: "61a1c16c-47f4-4b19-9e1b-74bf2ed3aef2",
            },
            {
               affected_range: "<4.6.2",
               affected_versions: "All versions before 4.6.2",
               cvss_v2: "AV:N/AC:L/Au:N/C:N/I:P/A:P",
               cvss_v3: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
               cwe_ids: [
                  "CWE-1035",
                  "CWE-937",
               ],
               date: "2021-08-17",
               description: "Versions of lodash lower than are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.",
               fixed_versions: [
                  "4.6.2",
               ],
               identifier: "CVE-2019-10744",
               identifiers: [
                  "GHSA-jf85-cpcp-j695",
                  "CVE-2019-10744",
               ],
               not_impacted: "All versions starting from 4.6.2",
               package_slug: "npm/lodash.mergewith",
               pubdate: "2019-07-10",
               solution: "Upgrade to version 4.6.2 or above.",
               title: "Prototype Pollution in lodash",
               urls: [
                  "https://github.com/lodash/lodash/pull/4336",
                  "https://nvd.nist.gov/vuln/detail/CVE-2019-10744",
                  "https://snyk.io/vuln/SNYK-JS-LODASH-450202",
                  "https://www.npmjs.com/advisories/1065",
                  "https://access.redhat.com/errata/RHSA-2019:3024",
                  "https://security.netapp.com/advisory/ntap-20191004-0005/",
                  "https://support.f5.com/csp/article/K47105354?utm_source=f5support&amp;utm_medium=RSS",
                  "https://www.oracle.com/security-alerts/cpujan2021.html",
                  "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  "https://github.com/advisories/GHSA-jf85-cpcp-j695",
               ],
               uuid: "14a5a248-8e25-472d-97ea-9137acf5dfad",
            },
            {
               affected_range: "<4.5.0",
               affected_versions: "All versions before 4.5.0",
               cvss_v2: "AV:N/AC:L/Au:N/C:N/I:P/A:P",
               cvss_v3: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
               cwe_ids: [
                  "CWE-1035",
                  "CWE-937",
               ],
               date: "2021-08-17",
               description: "Versions of lodash lower than are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.",
               fixed_versions: [
                  "4.5.0",
               ],
               identifier: "CVE-2019-10744",
               identifiers: [
                  "GHSA-jf85-cpcp-j695",
                  "CVE-2019-10744",
               ],
               not_impacted: "All versions starting from 4.5.0",
               package_slug: "npm/lodash.template",
               pubdate: "2019-07-10",
               solution: "Upgrade to version 4.5.0 or above.",
               title: "Prototype Pollution in lodash",
               urls: [
                  "https://github.com/lodash/lodash/pull/4336",
                  "https://nvd.nist.gov/vuln/detail/CVE-2019-10744",
                  "https://snyk.io/vuln/SNYK-JS-LODASH-450202",
                  "https://www.npmjs.com/advisories/1065",
                  "https://access.redhat.com/errata/RHSA-2019:3024",
                  "https://security.netapp.com/advisory/ntap-20191004-0005/",
                  "https://support.f5.com/csp/article/K47105354?utm_source=f5support&amp;utm_medium=RSS",
                  "https://www.oracle.com/security-alerts/cpujan2021.html",
                  "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  "https://github.com/advisories/GHSA-jf85-cpcp-j695",
               ],
               uuid: "ee4ac735-0da2-4b6c-9bde-dc480cbbe713",
            },
            {
               affected_range: "<4.17.12",
               affected_versions: "All versions before 4.17.12",
               cvss_v2: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               cvss_v3: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               cwe_ids: [
                  "CWE-1035",
                  "CWE-937",
               ],
               date: "2019-10-04",
               description: "lodash is vulnerable to Prototype Pollution. The function `defaultsDeep` could be tricked into adding or modifying properties of `Object.prototype` using a constructor payload.",
               fixed_versions: [
                  "4.17.12",
               ],
               identifier: "CVE-2019-10744",
               identifiers: [
                  "CVE-2019-10744",
               ],
               not_impacted: "All versions starting from 4.17.12",
               package_slug: "npm/lodash",
               pubdate: "2019-07-25",
               solution: "Upgrade to version 4.17.12 or above.",
               title: "Improper Input Validation",
               urls: [
                  "https://nvd.nist.gov/vuln/detail/CVE-2019-10744",
               ],
               uuid: "4774cd67-936f-419e-8533-ae5cfe7db9f9",
            },
         ],
      },
      "nvd.nist.gov": {
         cve: {
            configurations: [
               {
                  nodes: [
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:a:lodash:lodash:*:*:*:*:*:node.js:*:*",
                              matchCriteriaId: "5C21E48F-F34A-4124-9EF1-C106EB3B2209",
                              versionEndExcluding: "4.17.12",
                              vulnerable: true,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                  ],
               },
               {
                  nodes: [
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*",
                              matchCriteriaId: "F3E0B672-3E06-4422-B2A4-0BD073AEC2A1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                              matchCriteriaId: "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                              matchCriteriaId: "B55E8D50-99B4-47EC-86F9-699B67D473CE",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:netapp:service_level_manager:-:*:*:*:*:*:*:*",
                              matchCriteriaId: "7081652A-D28B-494E-94EF-CA88117F23EE",
                              vulnerable: true,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                  ],
               },
               {
                  nodes: [
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "9FA1A18F-D997-4121-A01B-FD9B3BF266CF",
                              vulnerable: true,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                  ],
               },
               {
                  nodes: [
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:a:oracle:banking_extensibility_workbench:14.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "EABAFD73-150F-4DFE-B721-29EB4475D979",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_extensibility_workbench:14.4.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "DE57039D-E2EE-4014-A7B1-D7380D26098E",
                              vulnerable: true,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                  ],
               },
               {
                  nodes: [
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "EE0532FA-7B7B-46B3-AB10-0920034A7E43",
                              versionEndExcluding: "12.1.5.2",
                              versionStartIncluding: "12.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "592327AA-BCC4-4CD0-82C6-EA739F049E82",
                              versionEndExcluding: "13.1.3.4",
                              versionStartIncluding: "13.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "2980BE62-6B8C-4E2A-B4EF-38A23E1CCD21",
                              versionEndExcluding: "14.1.2.5",
                              versionStartIncluding: "14.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "E9170095-A9BB-4D24-9925-39256D7CE2C6",
                              versionEndExcluding: "15.0.1.4",
                              versionStartIncluding: "15.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "56414352-0A79-4ED2-B670-D7CC9508FA9D",
                              versionEndExcluding: "15.1.0.2",
                              versionStartIncluding: "15.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "3B3DCE49-C37D-4951-AB57-7CDDEBA1C1E5",
                              versionEndExcluding: "12.1.5.2",
                              versionStartIncluding: "12.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "3DD78D19-D17E-45EC-98C7-74D086AE68AA",
                              versionEndExcluding: "13.1.3.4",
                              versionStartIncluding: "13.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "322E6570-185C-4413-A7CE-674CBAE95D05",
                              versionEndExcluding: "14.1.2.5",
                              versionStartIncluding: "14.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "5B59E16D-7645-492A-9C1D-A8724FFCA28F",
                              versionEndExcluding: "15.0.1.4",
                              versionStartIncluding: "15.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "0BA6818C-DCCE-4347-935A-CE6BA0014CDE",
                              versionEndExcluding: "15.1.0.2",
                              versionStartIncluding: "15.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "5D5AA99B-08E7-4959-A3B4-41AA527B4B22",
                              versionEndIncluding: "12.1.5",
                              versionStartIncluding: "12.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "4AC8FD5C-AE1A-4484-BB6F-EBB6A48D21F8",
                              versionEndIncluding: "13.1.3",
                              versionStartIncluding: "13.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "EC15881B-9C49-4E77-9FB6-A6E60D0BCAD3",
                              versionEndIncluding: "14.1.2",
                              versionStartIncluding: "14.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "D29F60E2-E39D-46E8-935E-8E0A0D32E262",
                              versionEndExcluding: "15.0.1.3",
                              versionStartIncluding: "15.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "F302F7BC-A08A-4DB3-A257-699C7DBDCAB0",
                              versionEndExcluding: "15.1.0.2",
                              versionStartIncluding: "15.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "5D3F7911-FB00-4612-9109-9E7A407BC7B7",
                              versionEndExcluding: "12.1.5.2",
                              versionStartIncluding: "12.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "B547F46F-5563-4E7F-8B69-3D25C6C58521",
                              versionEndExcluding: "13.1.3.4",
                              versionStartIncluding: "13.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "78753BD2-6631-459D-AD89-0FE2C0F3FDD5",
                              versionEndExcluding: "14.1.2.5",
                              versionStartIncluding: "14.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "997D12F1-098D-4C42-A6A2-B4F59AC78F0F",
                              versionEndExcluding: "15.0.1.4",
                              versionStartIncluding: "15.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "45920B7E-10A6-4066-87AB-60D584689891",
                              versionEndExcluding: "15.1.0.2",
                              versionStartIncluding: "15.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "91BF72A9-EB50-4315-B956-5926967DCC46",
                              versionEndExcluding: "12.1.5.2",
                              versionStartIncluding: "12.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "4AEE0B76-3F8E-420A-9589-BF3FDB942DEB",
                              versionEndExcluding: "13.1.3.4",
                              versionStartIncluding: "13.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "DA9E370F-2A37-4612-91DD-2B1FD7EECCE7",
                              versionEndExcluding: "14.1.2.5",
                              versionStartIncluding: "14.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "E6C4B56F-D022-4268-9D78-6E4D12AE9215",
                              versionEndExcluding: "15.0.1.4",
                              versionStartIncluding: "15.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "53CA3EC2-CE36-4388-A7A9-4311AD80A8B2",
                              versionEndExcluding: "15.1.0.2",
                              versionStartIncluding: "15.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "5043F299-FEE6-4878-8616-D2976FAC2BDF",
                              versionEndExcluding: "12.1.5.2",
                              versionStartIncluding: "12.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "E59859F8-3BF6-4BE3-8E4B-DF3B68303B22",
                              versionEndIncluding: "13.1.3",
                              versionStartIncluding: "13.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "024C7911-8C97-4A94-8F0B-18BE2109A499",
                              versionEndExcluding: "14.1.2.5",
                              versionStartIncluding: "14.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "9E14CCF2-E795-4763-A560-2C54C55619BE",
                              versionEndExcluding: "15.1.1",
                              versionStartIncluding: "15.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "73EC8EDA-669A-4750-934F-3B3FBF557080",
                              versionEndExcluding: "12.1.5.2",
                              versionStartIncluding: "12.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "C7917031-0735-483C-A8DA-11430056D568",
                              versionEndExcluding: "13.1.3.4",
                              versionStartIncluding: "13.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "5E10BF5A-2BD0-4791-B842-358968AFC9E6",
                              versionEndExcluding: "14.1.2.5",
                              versionStartIncluding: "14.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "EAFC0D83-7F64-44F2-A014-37DE3CAF846A",
                              versionEndExcluding: "15.0.1.4",
                              versionStartIncluding: "15.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "6419B4B3-DE7A-4B72-BFFC-6C646AC07BB7",
                              versionEndExcluding: "15.1.0.2",
                              versionStartIncluding: "15.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "5C3C6E77-BB41-48AA-AFEA-8C6F18BE7025",
                              versionEndExcluding: "12.1.5.2",
                              versionStartIncluding: "12.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "156F3B54-1827-4048-AACD-835092853943",
                              versionEndExcluding: "13.1.3.4",
                              versionStartIncluding: "13.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "206B46BD-846A-493C-BC83-531E6CD45F5A",
                              versionEndExcluding: "14.1.2.5",
                              versionStartIncluding: "14.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "DC1CC599-DA9C-46BD-9C5C-FD25D57AE9D6",
                              versionEndExcluding: "15.0.1.4",
                              versionStartIncluding: "15.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "C00CAEFA-C255-4C0B-8DE1-12686EC7D09B",
                              versionEndExcluding: "15.1.0.2",
                              versionStartIncluding: "15.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "A0581EEF-98E6-4961-8178-BA2D7647F931",
                              versionEndExcluding: "12.1.5.2",
                              versionStartIncluding: "12.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "FFC5C221-AE58-4580-876A-E5FD7970A695",
                              versionEndExcluding: "13.1.3.4",
                              versionStartIncluding: "13.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "27A9FAF9-7198-41FD-B093-AE11DD5AD67B",
                              versionEndExcluding: "14.1.2.5",
                              versionStartIncluding: "14.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "920BC3DD-A1D4-403B-83D2-00636C20FFC0",
                              versionEndExcluding: "15.0.1.4",
                              versionStartIncluding: "15.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "2BDD592C-6DBC-4A35-8483-ACC471FF92E3",
                              versionEndExcluding: "15.1.0.2",
                              versionStartIncluding: "15.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "32773569-67FE-4F08-A613-E507FCDEACEF",
                              versionEndExcluding: "12.1.5.2",
                              versionStartIncluding: "12.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "463AA399-492A-4DB6-BFD1-31725012AE8F",
                              versionEndExcluding: "13.1.3.4",
                              versionStartIncluding: "13.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "94F1100B-0EE4-41A7-AD34-336D4335751D",
                              versionEndExcluding: "14.1.2.5",
                              versionStartIncluding: "14.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "49C8BE4A-DED6-451A-B6EE-AC95DD26F85A",
                              versionEndExcluding: "15.0.1.4",
                              versionStartIncluding: "15.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "B3087972-862F-4A0D-9D9D-38BAB9D383F4",
                              versionEndExcluding: "15.1.0.2",
                              versionStartIncluding: "15.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "4494F771-4026-478C-8004-B162653DC80C",
                              versionEndExcluding: "12.1.5.2",
                              versionStartIncluding: "12.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "98314370-E3C8-4CB5-9F48-57004EB96D8F",
                              versionEndExcluding: "13.1.3.4",
                              versionStartIncluding: "13.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "929E75AD-5DC4-4992-A589-BA4516BC38FA",
                              versionEndExcluding: "14.1.2.5",
                              versionStartIncluding: "14.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "DEC0E30F-6550-4BC9-8DA7-6BD495DBF415",
                              versionEndExcluding: "15.0.1.4",
                              versionStartIncluding: "15.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "45641A58-0B5B-48C6-B0A3-0822A86A00AC",
                              versionEndExcluding: "15.1.0.2",
                              versionStartIncluding: "15.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "A97489DC-A5DE-48AD-BBA2-F9078070F53A",
                              versionEndExcluding: "12.1.5.2",
                              versionStartIncluding: "12.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "FBF128B7-874B-4E3A-B52F-1C2DE34F64A9",
                              versionEndExcluding: "13.1.3.4",
                              versionStartIncluding: "13.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "50AB72FA-552D-4B37-9C58-B4AB3B7B989A",
                              versionEndExcluding: "14.1.2.5",
                              versionStartIncluding: "14.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "D5D90F4A-FA2A-412F-8591-D1CA6399ECAD",
                              versionEndExcluding: "15.0.1.4",
                              versionStartIncluding: "15.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "8B5F9367-89D5-4D7D-A0FE-6C289E0A606C",
                              versionEndExcluding: "15.1.0.2",
                              versionStartIncluding: "15.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "1EDB944B-DF60-45AF-AD60-33E9667E0D12",
                              versionEndExcluding: "12.1.5.2",
                              versionStartIncluding: "12.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "20C58940-C7A3-47A9-8C9E-7B652E4F4750",
                              versionEndExcluding: "13.1.3.4",
                              versionStartIncluding: "13.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "DA5A4B1B-F4F0-4053-8756-2C84AA885060",
                              versionEndExcluding: "14.1.2.5",
                              versionStartIncluding: "14.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "BAD2867D-D646-4B01-A383-6A47B51D059E",
                              versionEndExcluding: "15.0.1.4",
                              versionStartIncluding: "15.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "D7C50229-3A95-4AA8-A720-4D35FF482DC3",
                              versionEndExcluding: "15.1.0.2",
                              versionStartIncluding: "15.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "02CB8916-A9ED-4935-BFBD-5C9E8D45379E",
                              versionEndExcluding: "12.1.5.2",
                              versionStartIncluding: "12.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "5853A161-2F92-4298-A70A-03A66DED157C",
                              versionEndExcluding: "13.1.3.4",
                              versionStartIncluding: "13.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "A86EF843-B0CB-4FB0-9E0A-51F7DD3BD44B",
                              versionEndExcluding: "14.1.2.5",
                              versionStartIncluding: "14.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "126DC4FA-E5EB-43E1-83F9-19F29E852E03",
                              versionEndExcluding: "15.0.1.4",
                              versionStartIncluding: "15.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "0064DE79-D6D6-4AE0-BF10-BF91FF9158DF",
                              versionEndExcluding: "15.1.0.2",
                              versionStartIncluding: "15.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "F37D18F2-8C6A-4557-85DC-2A751595423C",
                              versionEndIncluding: "6.1.0",
                              versionStartIncluding: "6.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-iq_centralized_management:5.4.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "A5C1DACF-0562-4A41-A9EC-60D1DC065007",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:big-iq_centralized_management:7.0.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "2B589C35-55F2-4D40-B5A6-8267EE20D627",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:f5:iworkflow:2.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "D3CE7526-9630-48EF-81FB-44904AF0653F",
                              vulnerable: true,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                  ],
               },
            ],
            descriptions: [
               {
                  lang: "en",
                  value: "Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.",
               },
               {
                  lang: "es",
                  value: "Las versiones de lodash inferiores a 4.17.12, son vulnerables a la Contaminación  de Prototipo. La función defaultsDeep podría ser engañada para agregar o modificar las propiedades de Object.prototype usando una carga útil de constructor.",
               },
            ],
            id: "CVE-2019-10744",
            lastModified: "2024-01-21T02:45:24.433",
            metrics: {
               cvssMetricV2: [
                  {
                     acInsufInfo: false,
                     baseSeverity: "MEDIUM",
                     cvssData: {
                        accessComplexity: "LOW",
                        accessVector: "NETWORK",
                        authentication: "NONE",
                        availabilityImpact: "PARTIAL",
                        baseScore: 6.4,
                        confidentialityImpact: "NONE",
                        integrityImpact: "PARTIAL",
                        vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:P",
                        version: "2.0",
                     },
                     exploitabilityScore: 10,
                     impactScore: 4.9,
                     obtainAllPrivilege: false,
                     obtainOtherPrivilege: false,
                     obtainUserPrivilege: false,
                     source: "nvd@nist.gov",
                     type: "Primary",
                     userInteractionRequired: false,
                  },
               ],
               cvssMetricV31: [
                  {
                     cvssData: {
                        attackComplexity: "LOW",
                        attackVector: "NETWORK",
                        availabilityImpact: "HIGH",
                        baseScore: 9.1,
                        baseSeverity: "CRITICAL",
                        confidentialityImpact: "NONE",
                        integrityImpact: "HIGH",
                        privilegesRequired: "NONE",
                        scope: "UNCHANGED",
                        userInteraction: "NONE",
                        vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
                        version: "3.1",
                     },
                     exploitabilityScore: 3.9,
                     impactScore: 5.2,
                     source: "nvd@nist.gov",
                     type: "Primary",
                  },
               ],
            },
            published: "2019-07-26T00:15:11.217",
            references: [
               {
                  source: "report@snyk.io",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:3024",
               },
               {
                  source: "report@snyk.io",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20191004-0005/",
               },
               {
                  source: "report@snyk.io",
                  tags: [
                     "Exploit",
                     "Third Party Advisory",
                  ],
                  url: "https://snyk.io/vuln/SNYK-JS-LODASH-450202",
               },
               {
                  source: "report@snyk.io",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://support.f5.com/csp/article/K47105354?utm_source=f5support&amp%3Butm_medium=RSS",
               },
               {
                  source: "report@snyk.io",
                  tags: [
                     "Patch",
                     "Third Party Advisory",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2021.html",
               },
               {
                  source: "report@snyk.io",
                  tags: [
                     "Patch",
                     "Third Party Advisory",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
               },
            ],
            sourceIdentifier: "report@snyk.io",
            vulnStatus: "Analyzed",
            weaknesses: [
               {
                  description: [
                     {
                        lang: "en",
                        value: "CWE-1321",
                     },
                  ],
                  source: "nvd@nist.gov",
                  type: "Primary",
               },
            ],
         },
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.