VAR-200701-0592
Vulnerability from variot - Updated: 2023-12-18 13:15Cisco Clean Access (CCA) 3.5.x through 3.5.9 and 3.6.x through 3.6.1.1 on the Clean Access Manager (CAM) allows remote attackers to bypass authentication and download arbitrary manual database backups by guessing the snapshot filename using brute force, then making a direct request for the file. Cisco Clean Access (CCA) is prone to a security bypass vulnerability. Cisco Clean Access (CCA) is a software solution for automatically detecting, quarantining, and cleaning devices infected with malicious code from accessing the network.
Secunia is proud to announce the availability of the Secunia Software Inspector.
The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor.
Try it out online: http://secunia.com/software_inspector/
TITLE: Cisco Clean Access Predictable Snapshots Filename
SECUNIA ADVISORY ID: SA23556
VERIFY ADVISORY: http://secunia.com/advisories/23556/
CRITICAL: Moderately critical
IMPACT: Exposure of sensitive information
WHERE:
From local network
SOFTWARE: Cisco Clean Access (CCA) 3.x http://secunia.com/product/5561/
DESCRIPTION: Cisco has acknowledged a security issue in Cisco Clean Access, which can be exploited by malicious people to gain knowledge of sensitive information.
The security issue is caused due to the use of a predictable method to name manual backups of the database, which can be exploited to disclose the contents of the database.
The security issue is reported in CCA releases 3.5.x - 3.5.9 and 3.6.x - 3.6.1.1. Other versions may also be affected.
SOLUTION: Update to versions 3.5.10 or 3.6.2.
PROVIDED AND/OR DISCOVERED BY: The vendor credits Chris Hartley from Ohio State University.
ORIGINAL ADVISORY: http://www.cisco.com/en/US/products/products_security_advisory09186a00807b6621.shtml
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200701-0592",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "network admission control manager and server system software",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.0.0"
},
{
"model": "network admission control manager and server system software",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.9"
},
{
"model": "network admission control manager and server system software",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.0"
},
{
"model": "network admission control manager and server system software",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.1.1"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.5.9"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "3.5.x to 3.5.9 and 3.6.x to 3.6.1.1"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3.5.1"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3.5.2"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3.5.5"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3.5.9"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3.5.4"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3.6.1.1"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3.5.5"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3.5.3"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3.6.0.1"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3.6.11"
}
],
"sources": [
{
"db": "BID",
"id": "86819"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-001324"
},
{
"db": "NVD",
"id": "CVE-2007-0058"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-017"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.6.1.1",
"versionStartIncluding": "3.6.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.5.9",
"versionStartIncluding": "3.5.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-0058"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "86819"
}
],
"trust": 0.3
},
"cve": "CVE-2007-0058",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.8,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2007-0058",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-23420",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2007-0058",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-200701-017",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-23420",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-23420"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-001324"
},
{
"db": "NVD",
"id": "CVE-2007-0058"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-017"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Clean Access (CCA) 3.5.x through 3.5.9 and 3.6.x through 3.6.1.1 on the Clean Access Manager (CAM) allows remote attackers to bypass authentication and download arbitrary manual database backups by guessing the snapshot filename using brute force, then making a direct request for the file. Cisco Clean Access (CCA) is prone to a security bypass vulnerability. Cisco Clean Access (CCA) is a software solution for automatically detecting, quarantining, and cleaning devices infected with malicious code from accessing the network. \n\n----------------------------------------------------------------------\n\nSecunia is proud to announce the availability of the Secunia Software\nInspector. \n\nThe Secunia Software Inspector is a free service that detects insecure\nversions of software that you may have installed in your system. When\ninsecure versions are detected, the Secunia Software Inspector also\nprovides thorough guidelines for updating the software to the latest\nsecure version from the vendor. \n\nTry it out online:\nhttp://secunia.com/software_inspector/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco Clean Access Predictable Snapshots Filename\n\nSECUNIA ADVISORY ID:\nSA23556\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/23556/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nExposure of sensitive information\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nCisco Clean Access (CCA) 3.x\nhttp://secunia.com/product/5561/\n\nDESCRIPTION:\nCisco has acknowledged a security issue in Cisco Clean Access, which\ncan be exploited by malicious people to gain knowledge of sensitive\ninformation. \n\nThe security issue is caused due to the use of a predictable method\nto name manual backups of the database, which can be exploited to\ndisclose the contents of the database. \n\nThe security issue is reported in CCA releases 3.5.x - 3.5.9 and\n3.6.x - 3.6.1.1. Other versions may also be affected. \n\nSOLUTION:\nUpdate to versions 3.5.10 or 3.6.2. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Chris Hartley from Ohio State University. \n\nORIGINAL ADVISORY:\nhttp://www.cisco.com/en/US/products/products_security_advisory09186a00807b6621.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-0058"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-001324"
},
{
"db": "BID",
"id": "86819"
},
{
"db": "VULHUB",
"id": "VHN-23420"
},
{
"db": "PACKETSTORM",
"id": "53425"
}
],
"trust": 2.07
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2007-0058",
"trust": 2.8
},
{
"db": "SECTRACK",
"id": "1017465",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "23556",
"trust": 1.8
},
{
"db": "OSVDB",
"id": "32579",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2007-0030",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2007-001324",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200701-017",
"trust": 0.7
},
{
"db": "CISCO",
"id": "20070103 MULTIPLE VULNERABILITIES IN CISCO CLEAN ACCESS",
"trust": 0.6
},
{
"db": "BID",
"id": "86819",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-23420",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "53425",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-23420"
},
{
"db": "BID",
"id": "86819"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-001324"
},
{
"db": "PACKETSTORM",
"id": "53425"
},
{
"db": "NVD",
"id": "CVE-2007-0058"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-017"
}
]
},
"id": "VAR-200701-0592",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-23420"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:15:49.525000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20070103-CleanAccess",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20070103-cleanaccess"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-001324"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-23420"
},
{
"db": "NVD",
"id": "CVE-2007-0058"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-cleanaccess.shtml"
},
{
"trust": 2.0,
"url": "http://securitytracker.com/id?1017465"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/32579"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/23556"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2007/0030"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0058"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0058"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2007/0030"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/products/products_security_advisory09186a00807b6621.shtml"
},
{
"trust": 0.1,
"url": "http://secunia.com/software_inspector/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/5561/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/23556/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-23420"
},
{
"db": "BID",
"id": "86819"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-001324"
},
{
"db": "PACKETSTORM",
"id": "53425"
},
{
"db": "NVD",
"id": "CVE-2007-0058"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-017"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-23420"
},
{
"db": "BID",
"id": "86819"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-001324"
},
{
"db": "PACKETSTORM",
"id": "53425"
},
{
"db": "NVD",
"id": "CVE-2007-0058"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-017"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-01-04T00:00:00",
"db": "VULHUB",
"id": "VHN-23420"
},
{
"date": "2007-01-04T00:00:00",
"db": "BID",
"id": "86819"
},
{
"date": "2012-06-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-001324"
},
{
"date": "2007-01-04T17:16:54",
"db": "PACKETSTORM",
"id": "53425"
},
{
"date": "2007-01-04T22:28:00",
"db": "NVD",
"id": "CVE-2007-0058"
},
{
"date": "2007-01-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200701-017"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-30T00:00:00",
"db": "VULHUB",
"id": "VHN-23420"
},
{
"date": "2007-01-04T00:00:00",
"db": "BID",
"id": "86819"
},
{
"date": "2012-06-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-001324"
},
{
"date": "2018-10-30T16:25:04.370000",
"db": "NVD",
"id": "CVE-2007-0058"
},
{
"date": "2007-07-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200701-017"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200701-017"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "CAM of CCA Arbitrary manual database backup download vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-001324"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200701-017"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.