VAR-200109-0126

Vulnerability from variot - Updated: 2023-12-18 13:05

Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message. A remotely exploitable buffer overflow exists in the Gauntlet Firewall. A boundary condition error exists in the smap/smapd and CSMAPD daemons, shipped with several popular Network Associates products. The smap/smapd and CSMAP daemons are proxy servers used to handle e-mail transactions for both inbound and outbound e-mail. By successfully exploiting this condition, an attacker may be able to cause arbitrary code/commands to be executed on a vulnerable system with the privileges of the attacked daemon. Additional technical details are currently unknown. Some versions of SGI IRIX shipped with the Gauntlet Firewall package, and in the past it was a supported SGI product. While it is no longer being supported, SGI IRIX versions 6.5.2, 6.5.3, 6.5.4 and 6.5.5 may be prone to this issue

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200109-0126",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mcafee e-ppliance",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "network associates",
        "version": "120_series"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sgi",
        "version": "6.5"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sgi",
        "version": "6.4"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sgi",
        "version": "6.3"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sgi",
        "version": "6.2"
      },
      {
        "model": "e-ppliance 300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "pgp",
        "version": "1.0"
      },
      {
        "model": "mcafee e-ppliance",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "network associates",
        "version": "100_series"
      },
      {
        "model": "webshield smtp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mcafee",
        "version": "4.1"
      },
      {
        "model": "gauntlet firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "network associates",
        "version": "unix_6.0"
      },
      {
        "model": "e-ppliance 300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "pgp",
        "version": "2.0"
      },
      {
        "model": "gauntlet firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "network associates",
        "version": "unix_5.5"
      },
      {
        "model": "gauntlet firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "network associates",
        "version": "4.2"
      },
      {
        "model": "webshield smtp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mcafee",
        "version": "4.0"
      },
      {
        "model": "gauntlet firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "network associates",
        "version": "unix_5.0"
      },
      {
        "model": "e-ppliance 300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "pgp",
        "version": "1.5"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "pgp",
        "version": null
      },
      {
        "model": "pgp e-ppliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "securecomputing",
        "version": "3002.0"
      },
      {
        "model": "pgp e-ppliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "securecomputing",
        "version": "3001.5"
      },
      {
        "model": "pgp e-ppliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "securecomputing",
        "version": "3001.0"
      },
      {
        "model": "associates pgp e-ppliance series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "network",
        "version": "3002.0"
      },
      {
        "model": "associates pgp e-ppliance series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "network",
        "version": "3001.5"
      },
      {
        "model": "associates pgp e-ppliance series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "network",
        "version": "3001.0"
      },
      {
        "model": "associates gauntlet firewall for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "network",
        "version": "6.0"
      },
      {
        "model": "associates gauntlet firewall for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "network",
        "version": "5.5"
      },
      {
        "model": "associates gauntlet firewall for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "network",
        "version": "5.0"
      },
      {
        "model": "associates gauntlet firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "network",
        "version": "4.2"
      },
      {
        "model": "webshield for solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mcafee",
        "version": "4.0"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#206723"
      },
      {
        "db": "BID",
        "id": "3290"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-1456"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200109-005"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:mcafee:webshield_smtp:4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mcafee:webshield_smtp:4.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:pgp:e-ppliance_300:2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:network_associates:gauntlet_firewall:4.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:network_associates:gauntlet_firewall:unix_5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:network_associates:gauntlet_firewall:unix_5.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:network_associates:gauntlet_firewall:unix_6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:pgp:e-ppliance_300:1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:pgp:e-ppliance_300:1.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:network_associates:mcafee_e-ppliance:100_series:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:network_associates:mcafee_e-ppliance:120_series:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-1456"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Discovered by Jim Stickley of Garrison Technologies and published in a PGP Security Advisory on September 4, 2001.",
    "sources": [
      {
        "db": "BID",
        "id": "3290"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200109-005"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2001-1456",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-4260",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2001-1456",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#206723",
            "trust": 0.8,
            "value": "50.63"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200109-005",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-4260",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#206723"
      },
      {
        "db": "VULHUB",
        "id": "VHN-4260"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-1456"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200109-005"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message. A remotely exploitable buffer overflow exists in the Gauntlet Firewall. A boundary condition error exists in the smap/smapd and CSMAPD daemons, shipped with several popular Network Associates products.  The smap/smapd and CSMAP daemons are proxy servers used to handle e-mail transactions for both inbound and outbound e-mail. \nBy successfully exploiting this condition, an attacker may be able to cause arbitrary code/commands to be executed on a vulnerable system with the privileges of the attacked daemon. \nAdditional technical details are currently unknown. \nSome versions of SGI IRIX shipped with the Gauntlet Firewall package, and in the past it was a supported SGI product. While it is no longer being supported, SGI IRIX versions 6.5.2, 6.5.3, 6.5.4 and 6.5.5 may be prone to this issue",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-1456"
      },
      {
        "db": "CERT/CC",
        "id": "VU#206723"
      },
      {
        "db": "BID",
        "id": "3290"
      },
      {
        "db": "VULHUB",
        "id": "VHN-4260"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#206723",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "3290",
        "trust": 2.0
      },
      {
        "db": "NVD",
        "id": "CVE-2001-1456",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200109-005",
        "trust": 0.7
      },
      {
        "db": "SGI",
        "id": "20011104-01-I",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "CA-2001-25",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "7088",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-4260",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#206723"
      },
      {
        "db": "VULHUB",
        "id": "VHN-4260"
      },
      {
        "db": "BID",
        "id": "3290"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-1456"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200109-005"
      }
    ]
  },
  "id": "VAR-200109-0126",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-4260"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:05:39.848000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-4260"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-1456"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/3290"
      },
      {
        "trust": 1.7,
        "url": "http://www.cert.org/advisories/ca-2001-25.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.kb.cert.org/vuls/id/206723"
      },
      {
        "trust": 1.7,
        "url": "ftp://patches.sgi.com/support/free/security/advisories/20011104-01-i"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7088"
      },
      {
        "trust": 0.8,
        "url": "about vulnerability notes"
      },
      {
        "trust": 0.8,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 0.8,
        "url": "provide a vendor statement"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/7088"
      },
      {
        "trust": 0.3,
        "url": "http://www.pgp.com/support/product-advisories/csmap.asp"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#206723"
      },
      {
        "db": "VULHUB",
        "id": "VHN-4260"
      },
      {
        "db": "BID",
        "id": "3290"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-1456"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200109-005"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#206723"
      },
      {
        "db": "VULHUB",
        "id": "VHN-4260"
      },
      {
        "db": "BID",
        "id": "3290"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-1456"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200109-005"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2001-09-06T00:00:00",
        "db": "CERT/CC",
        "id": "VU#206723"
      },
      {
        "date": "2001-09-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-4260"
      },
      {
        "date": "2001-09-04T00:00:00",
        "db": "BID",
        "id": "3290"
      },
      {
        "date": "2001-09-04T04:00:00",
        "db": "NVD",
        "id": "CVE-2001-1456"
      },
      {
        "date": "2001-09-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200109-005"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2001-09-06T00:00:00",
        "db": "CERT/CC",
        "id": "VU#206723"
      },
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-4260"
      },
      {
        "date": "2015-03-19T09:07:00",
        "db": "BID",
        "id": "3290"
      },
      {
        "date": "2017-07-11T01:29:08.197000",
        "db": "NVD",
        "id": "CVE-2001-1456"
      },
      {
        "date": "2006-09-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200109-005"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200109-005"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Network Associates CSMAP and smap/smapd vulnerable to buffer overflow thereby allowing arbitrary command execution",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#206723"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200109-005"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…