var-200708-0003
Vulnerability from variot
Unspecified vulnerability in Atheros 802.11 a/b/g wireless adapter drivers before 5.3.0.35, and 6.x before 6.0.3.67, on Windows allows remote attackers to cause a denial of service via a crafted 802.11 management frame. Atheros wireless drivers fail to properly handle malformed wireless frames. This vulnerability may allow a remote, unauthenticated attacker to create a denial-of-service condition. Atheros Provided by the company Microsoft Windows The wireless network driver for is vulnerable to the frame handling part. Crafted 802.11 Sending a management frame causes a buffer overflow, resulting in service disruption ( DoS ) You may be attacked. 802.11b, 802.11g, 802.11n Management frames in are not encrypted and do not require authentication to be sent. further, WEP And WPA It has been found that even if wireless communication encryption such as is affected by this vulnerability. Linux And UNIX Used in NDISWrapper And using vulnerable drivers with similar technologies may also be affected.
The driver did not adequately check for malformed management frames, and a remote attacker could trigger an overflow by sending a specially constructed 802.11 management frame that requires no authentication or encryption. Atheros drivers are also used by OEM (Original Equipment Manufacturer) wireless adapters. This issue is reported to affect drivers for the Windows operating system.
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors.
SOLUTION: The vendor has reportedly issued firmware updates (versions 5.3.0.35 and 6.0.3.67 and later) to OEMs.
PROVIDED AND/OR DISCOVERED BY: Reported via US-CERT.
ORIGINAL ADVISORY: US-CERT VU#730169: http://www.kb.cert.org/vuls/id/730169
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200708-0003", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "all windows", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "*" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "atheros", "version": null }, { "model": "driver", "scope": "eq", "trust": 0.8, "vendor": "atheros", "version": "version 5.3.0 system (atheros 802.11 a/b/g)" }, { "model": "driver", "scope": "eq", "trust": 0.8, "vendor": "atheros", "version": "version 6.0.3 system (atheros 802.11 a/b/g)" }, { "model": "celsius work station", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "fmv desktop", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "fmv thin client", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "fmv-biblo", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "fmv-biblo loox", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "fmv-deskpower", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "fmv-esprimo", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "fmv-lifebook", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "fmv-stylistic", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": null, "scope": null, "trust": 0.6, "vendor": "none", "version": null }, { "model": "wireless adapter drivers", "scope": "eq", "trust": 0.6, "vendor": "atheros", "version": "6.0.3.67" }, { "model": "wireless adapter drivers", "scope": "eq", "trust": 0.6, "vendor": "atheros", "version": "5.1.1.9" }, { "model": "communications wireless driver a/b/g", "scope": "eq", "trust": 0.3, "vendor": "atheros", "version": "802.110" } ], "sources": [ { "db": "CERT/CC", "id": "VU#730169" }, { "db": "CNVD", "id": "CNVD-2007-4814" }, { "db": "BID", "id": "25160" }, { "db": "JVNDB", "id": "JVNDB-2007-000565" }, { "db": "NVD", "id": "CVE-2007-2927" }, { "db": "CNNVD", "id": "CNNVD-200708-075" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:atheros:wireless_adapter_drivers:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.1.1.9", "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:atheros:wireless_adapter_drivers:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.0.3.67", "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2007-2927" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Nicholas Krasny", "sources": [ { "db": "CNNVD", "id": "CNNVD-200708-075" } ], "trust": 0.6 }, "cve": "CVE-2007-2927", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2007-2927", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-26289", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2007-2927", "trust": 1.8, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#730169", "trust": 0.8, "value": "0.77" }, { "author": "CNNVD", "id": "CNNVD-200708-075", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-26289", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#730169" }, { "db": "VULHUB", "id": "VHN-26289" }, { "db": "JVNDB", "id": "JVNDB-2007-000565" }, { "db": "NVD", "id": "CVE-2007-2927" }, { "db": "CNNVD", "id": "CNNVD-200708-075" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in Atheros 802.11 a/b/g wireless adapter drivers before 5.3.0.35, and 6.x before 6.0.3.67, on Windows allows remote attackers to cause a denial of service via a crafted 802.11 management frame. Atheros wireless drivers fail to properly handle malformed wireless frames. This vulnerability may allow a remote, unauthenticated attacker to create a denial-of-service condition. Atheros Provided by the company Microsoft Windows The wireless network driver for is vulnerable to the frame handling part. Crafted 802.11 Sending a management frame causes a buffer overflow, resulting in service disruption ( DoS ) You may be attacked. 802.11b, 802.11g, 802.11n Management frames in are not encrypted and do not require authentication to be sent. further, WEP And WPA It has been found that even if wireless communication encryption such as is affected by this vulnerability. Linux And UNIX Used in NDISWrapper And using vulnerable drivers with similar technologies may also be affected. \n\n\u00a0The driver did not adequately check for malformed management frames, and a remote attacker could trigger an overflow by sending a specially constructed 802.11 management frame that requires no authentication or encryption. \nAtheros drivers are also used by OEM (Original Equipment Manufacturer) wireless adapters. \nThis issue is reported to affect drivers for the Windows operating system. \n\n----------------------------------------------------------------------\n\nBETA test the new Secunia Personal Software Inspector!\n\nThe Secunia PSI detects installed software on your computer and\ncategorises it as either Insecure, End-of-Life, or Up-To-Date. \nEffectively enabling you to focus your attention on software\ninstallations where more secure versions are available from the\nvendors. \n\nSOLUTION:\nThe vendor has reportedly issued firmware updates (versions 5.3.0.35\nand 6.0.3.67 and later) to OEMs. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported via US-CERT. \n\nORIGINAL ADVISORY:\nUS-CERT VU#730169:\nhttp://www.kb.cert.org/vuls/id/730169\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-2927" }, { "db": "CERT/CC", "id": "VU#730169" }, { "db": "JVNDB", "id": "JVNDB-2007-000565" }, { "db": "CNVD", "id": "CNVD-2007-4814" }, { "db": "BID", "id": "25160" }, { "db": "VULHUB", "id": "VHN-26289" }, { "db": "PACKETSTORM", "id": "58395" } ], "trust": 3.33 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#730169", "trust": 3.7 }, { "db": "NVD", "id": "CVE-2007-2927", "trust": 3.4 }, { "db": "SECUNIA", "id": "26348", "trust": 2.7 }, { "db": "BID", "id": "25160", "trust": 2.0 }, { "db": "VUPEN", "id": "ADV-2007-2756", "trust": 1.7 }, { "db": "OSVDB", "id": "37992", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2007-000565", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2007-4814", "trust": 0.6 }, { "db": "XF", "id": "35788", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200708-075", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-26289", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "58395", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#730169" }, { "db": "CNVD", "id": "CNVD-2007-4814" }, { "db": "VULHUB", "id": "VHN-26289" }, { "db": "BID", "id": "25160" }, { "db": "JVNDB", "id": "JVNDB-2007-000565" }, { "db": "PACKETSTORM", "id": "58395" }, { "db": "NVD", "id": "CVE-2007-2927" }, { "db": "CNNVD", "id": "CNNVD-200708-075" } ] }, "id": "VAR-200708-0003", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-26289" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:53:59.244000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.atheros.com/" }, { "title": "Atheros\u793e\u88fd\u7121\u7dda\uff08\u30ef\u30a4\u30e4\u30ec\u30b9\uff09LAN\u30c9\u30e9\u30a4\u30d0\u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b", "trust": 0.8, "url": "http://www.fmworld.net/biz/common/atheros/wlan/" }, { "title": "VU#730169", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/vulnerabilities/vu730169.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000565" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-2927" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.kb.cert.org/vuls/id/730169" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/25160" }, { "trust": 1.7, "url": "http://osvdb.org/37992" }, { "trust": 1.7, "url": "http://secunia.com/advisories/26348" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/2756" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35788" }, { "trust": 0.9, "url": "http://secunia.com/advisories/26348/" }, { "trust": 0.8, "url": "http://www.atheros.com/contact/index.html" }, { "trust": 0.8, "url": "http://standards.ieee.org/announcements/pr_frames.html" }, { "trust": 0.8, "url": "http://standards.ieee.org/getieee802/download/802.11-1999.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2927" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu%23730169/index.html" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2927" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2007/2756" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/35788" }, { "trust": 0.3, "url": "http://www.atheros.com" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/15189/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#730169" }, { "db": "VULHUB", "id": "VHN-26289" }, { "db": "BID", "id": "25160" }, { "db": "JVNDB", "id": "JVNDB-2007-000565" }, { "db": "PACKETSTORM", "id": "58395" }, { "db": "NVD", "id": "CVE-2007-2927" }, { "db": "CNNVD", "id": "CNNVD-200708-075" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#730169" }, { "db": "CNVD", "id": "CNVD-2007-4814" }, { "db": "VULHUB", "id": "VHN-26289" }, { "db": "BID", "id": "25160" }, { "db": "JVNDB", "id": "JVNDB-2007-000565" }, { "db": "PACKETSTORM", "id": "58395" }, { "db": "NVD", "id": "CVE-2007-2927" }, { "db": "CNNVD", "id": "CNNVD-200708-075" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-08-01T00:00:00", "db": "CERT/CC", "id": "VU#730169" }, { "date": "2007-08-01T00:00:00", "db": "CNVD", "id": "CNVD-2007-4814" }, { "date": "2007-08-08T00:00:00", "db": "VULHUB", "id": "VHN-26289" }, { "date": "2007-08-01T00:00:00", "db": "BID", "id": "25160" }, { "date": "2007-08-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000565" }, { "date": "2007-08-10T02:01:07", "db": "PACKETSTORM", "id": "58395" }, { "date": "2007-08-08T01:17:00", "db": "NVD", "id": "CVE-2007-2927" }, { "date": "2007-08-07T00:00:00", "db": "CNNVD", "id": "CNNVD-200708-075" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-12-12T00:00:00", "db": "CERT/CC", "id": "VU#730169" }, { "date": "2007-08-01T00:00:00", "db": "CNVD", "id": "CNVD-2007-4814" }, { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-26289" }, { "date": "2007-08-02T20:55:00", "db": "BID", "id": "25160" }, { "date": "2007-11-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000565" }, { "date": "2017-07-29T01:31:50.957000", "db": "NVD", "id": "CVE-2007-2927" }, { "date": "2007-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200708-075" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200708-075" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Atheros wireless network drivers may fail to properly handle malformed frames", "sources": [ { "db": "CERT/CC", "id": "VU#730169" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200708-075" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.