VAR-200412-1229
Vulnerability from variot - Updated: 2023-12-18 12:40Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file. Multiple vulnerabilities have been identified in the WS_FTP Server and client applications. The issues include two remote buffer overflow vulnerabilities in the client, a denial of service vulnerability in the server and an access validation issue in the server leading to remote command execution with SYSTEM privileges. These issues are undergoing further analysis. This BID will be divided into separate issues as analysis is completed. Progress Software Ipswitch WS_FTP Server is a set of FTP server software developed by Progress Software Company in the United States. It provides functions such as file transfer control and transfer encryption. A resource management error vulnerability exists in Progress Software Ipswitch WS_FTP Server version 4.0.2. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200412-1229",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.3,
"vendor": "ipswitch",
"version": "4.01"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "2.0"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "ipswitch",
"version": "3.0_1"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "2.0.2"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "2.0.1"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "3.4"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "3.0"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "2.0.4"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "3.1"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "1.0.5"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "1.0.2"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "4.0.2"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "2.0.3"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "3.1.2"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "4.0"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "1.0.1"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "3.1.3"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "1.0.4"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "3.1.1"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 1.0,
"vendor": "progress",
"version": "1.0.3"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.9,
"vendor": "ipswitch",
"version": "2.0.4"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.9,
"vendor": "ipswitch",
"version": "2.0.3"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.9,
"vendor": "ipswitch",
"version": "2.0.2"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.9,
"vendor": "ipswitch",
"version": "2.0.1"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.9,
"vendor": "ipswitch",
"version": "2.0"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.9,
"vendor": "ipswitch",
"version": "1.0.5"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.9,
"vendor": "ipswitch",
"version": "1.0.4"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.9,
"vendor": "ipswitch",
"version": "1.0.3"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.9,
"vendor": "ipswitch",
"version": "1.0.2"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.9,
"vendor": "ipswitch",
"version": "1.0.1"
},
{
"model": "ws ftp pro",
"scope": "eq",
"trust": 0.3,
"vendor": "ipswitch",
"version": "8.03"
},
{
"model": "ws ftp pro",
"scope": "eq",
"trust": 0.3,
"vendor": "ipswitch",
"version": "8.02"
},
{
"model": "ws ftp pro",
"scope": "eq",
"trust": 0.3,
"vendor": "ipswitch",
"version": "7.5"
},
{
"model": "ws ftp pro",
"scope": "eq",
"trust": 0.3,
"vendor": "ipswitch",
"version": "6.0"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.3,
"vendor": "ipswitch",
"version": "4.02"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.3,
"vendor": "ipswitch",
"version": "4.0"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.3,
"vendor": "ipswitch",
"version": "3.4"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.3,
"vendor": "ipswitch",
"version": "3.1.3"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.3,
"vendor": "ipswitch",
"version": "3.1.2"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.3,
"vendor": "ipswitch",
"version": "3.1.1"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.3,
"vendor": "ipswitch",
"version": "3.1"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.3,
"vendor": "ipswitch",
"version": "3.01"
},
{
"model": "ws ftp server",
"scope": "eq",
"trust": 0.3,
"vendor": "ipswitch",
"version": "3.0"
}
],
"sources": [
{
"db": "BID",
"id": "9953"
},
{
"db": "NVD",
"id": "CVE-2004-1848"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-199"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ipswitch:ws_ftp_server:4.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ipswitch:ws_ftp_server:3.0_1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2004-1848"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Discovery is credited to Hugh Mann \u003chughmann@hotmail.com\u003e.",
"sources": [
{
"db": "BID",
"id": "9953"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-199"
}
],
"trust": 0.9
},
"cve": "CVE-2004-1848",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-10277",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2004-1848",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200412-199",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-10277",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-10277"
},
{
"db": "NVD",
"id": "CVE-2004-1848"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-199"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file. Multiple vulnerabilities have been identified in the WS_FTP Server and client applications. \nThe issues include two remote buffer overflow vulnerabilities in the client, a denial of service vulnerability in the server and an access validation issue in the server leading to remote command execution with SYSTEM privileges. \nThese issues are undergoing further analysis. This BID will be divided into separate issues as analysis is completed. Progress Software Ipswitch WS_FTP Server is a set of FTP server software developed by Progress Software Company in the United States. It provides functions such as file transfer control and transfer encryption. A resource management error vulnerability exists in Progress Software Ipswitch WS_FTP Server version 4.0.2. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products",
"sources": [
{
"db": "NVD",
"id": "CVE-2004-1848"
},
{
"db": "BID",
"id": "9953"
},
{
"db": "VULHUB",
"id": "VHN-10277"
}
],
"trust": 1.26
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "9953",
"trust": 2.0
},
{
"db": "SECTRACK",
"id": "1009529",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "11206",
"trust": 1.7
},
{
"db": "NVD",
"id": "CVE-2004-1848",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "4542",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-200412-199",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-10277",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-10277"
},
{
"db": "BID",
"id": "9953"
},
{
"db": "NVD",
"id": "CVE-2004-1848"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-199"
}
]
},
"id": "VAR-200412-1229",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-10277"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:40:29.627000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-10277"
},
{
"db": "NVD",
"id": "CVE-2004-1848"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/9953"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/4542"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1009529"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/11206"
},
{
"trust": 1.7,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15560"
},
{
"trust": 1.7,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41831"
},
{
"trust": 1.6,
"url": "http://marc.info/?l=bugtraq\u0026m=108006717731989\u0026w=2"
},
{
"trust": 0.3,
"url": "http://www.ipswitch.com/"
},
{
"trust": 0.3,
"url": "/archive/1/358356"
},
{
"trust": 0.3,
"url": "/archive/1/358363"
},
{
"trust": 0.3,
"url": "/archive/1/358357"
},
{
"trust": 0.3,
"url": "/archive/1/358361"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=108006717731989\u0026amp;w=2"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-10277"
},
{
"db": "BID",
"id": "9953"
},
{
"db": "NVD",
"id": "CVE-2004-1848"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-199"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-10277"
},
{
"db": "BID",
"id": "9953"
},
{
"db": "NVD",
"id": "CVE-2004-1848"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-199"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-12-31T00:00:00",
"db": "VULHUB",
"id": "VHN-10277"
},
{
"date": "2004-03-23T00:00:00",
"db": "BID",
"id": "9953"
},
{
"date": "2004-12-31T05:00:00",
"db": "NVD",
"id": "CVE-2004-1848"
},
{
"date": "2004-12-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200412-199"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-08-13T00:00:00",
"db": "VULHUB",
"id": "VHN-10277"
},
{
"date": "2004-03-23T00:00:00",
"db": "BID",
"id": "9953"
},
{
"date": "2023-10-11T14:45:44.747000",
"db": "NVD",
"id": "CVE-2004-1848"
},
{
"date": "2020-05-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200412-199"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200412-199"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Progress Software Ipswitch WS_FTP Server Security hole",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200412-199"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200412-199"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.