VAR-201206-0087
Vulnerability from variot - Updated: 2023-12-18 12:22The HostScan downloader implementation in Cisco AnyConnect Secure Mobility Client 3.x before 3.0 MR8 and Cisco Secure Desktop before 3.6.6020 does not compare the timestamp of offered software to the timestamp of installed software, which allows remote attackers to force a version downgrade by using (1) ActiveX or (2) Java components to offer signed code that corresponds to an older software release, aka Bug ID CSCtx74235. This older version of the client software may contain vulnerabilities which can be exploited by the attacker to perform further attacks. These issues are tracked by Cisco Bug IDs CSCtw48681 and CSCtx74235. Cisco AnyConnect Secure Mobility is a secure enterprise mobility solution. The vulnerability stems from not comparing the software timestamp provided by the installed software timestamp. Also known as Bug ID CSCtx74235
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201206-0087",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.9,
"vendor": "cisco",
"version": "3.5.1077"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.9,
"vendor": "cisco",
"version": "3.5.841"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.9,
"vendor": "cisco",
"version": "3.1.1"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.9,
"vendor": "cisco",
"version": "3.2"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.9,
"vendor": "cisco",
"version": "3.1"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "3.2.1"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "3.5.2001"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "3.3"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "3.5"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "3.4.2048"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "3.1.1.45"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "3.1.1.33"
},
{
"model": "anyconnect secure mobility client",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "3.0"
},
{
"model": "secure desktop",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.2008"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.1.1.27"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.1"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.2"
},
{
"model": "anyconnect secure mobility client",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "3.0 mr8"
},
{
"model": "anyconnect secure mobility client",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "3.x"
},
{
"model": "secure desktop",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3.5.2008"
},
{
"model": "anyconnect secure mobility client",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3.0.629"
},
{
"model": "anyconnect secure mobility client",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2.5.3046"
},
{
"model": "anyconnect secure mobility client",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2.5.3041"
},
{
"model": "anyconnect secure mobility client",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2.5"
},
{
"model": "anyconnect secure mobility client",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2.3.254"
},
{
"model": "anyconnect secure mobility client",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2.3.185"
},
{
"model": "anyconnect secure mobility client",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2.3"
}
],
"sources": [
{
"db": "BID",
"id": "54108"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002812"
},
{
"db": "NVD",
"id": "CVE-2012-2495"
},
{
"db": "CNNVD",
"id": "CNNVD-201206-375"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.1.1.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.5.2001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.5.841:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.4.2048:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.1.1.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.1.1.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:3.5.1077:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.5.2008",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2012-2495"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "gwslabs.com via Zero Day Initiative and Cisco",
"sources": [
{
"db": "BID",
"id": "54108"
}
],
"trust": 0.3
},
"cve": "CVE-2012-2495",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2012-2495",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-55776",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2012-2495",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201206-375",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-55776",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-55776"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002812"
},
{
"db": "NVD",
"id": "CVE-2012-2495"
},
{
"db": "CNNVD",
"id": "CNNVD-201206-375"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The HostScan downloader implementation in Cisco AnyConnect Secure Mobility Client 3.x before 3.0 MR8 and Cisco Secure Desktop before 3.6.6020 does not compare the timestamp of offered software to the timestamp of installed software, which allows remote attackers to force a version downgrade by using (1) ActiveX or (2) Java components to offer signed code that corresponds to an older software release, aka Bug ID CSCtx74235. This older version of the client software may contain vulnerabilities which can be exploited by the attacker to perform further attacks. \nThese issues are tracked by Cisco Bug IDs CSCtw48681 and CSCtx74235. Cisco AnyConnect Secure Mobility is a secure enterprise mobility solution. The vulnerability stems from not comparing the software timestamp provided by the installed software timestamp. Also known as Bug ID CSCtx74235",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-2495"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002812"
},
{
"db": "BID",
"id": "54108"
},
{
"db": "VULHUB",
"id": "VHN-55776"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-2495",
"trust": 2.8
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002812",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201206-375",
"trust": 0.7
},
{
"db": "CISCO",
"id": "20120620 MULTIPLE VULNERABILITIES IN CISCO ANYCONNECT SECURE MOBILITY CLIENT",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "19867",
"trust": 0.6
},
{
"db": "ZDI",
"id": "ZDI-12-149",
"trust": 0.3
},
{
"db": "BID",
"id": "54108",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-55776",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-55776"
},
{
"db": "BID",
"id": "54108"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002812"
},
{
"db": "NVD",
"id": "CVE-2012-2495"
},
{
"db": "CNNVD",
"id": "CNNVD-201206-375"
}
]
},
"id": "VAR-201206-0087",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-55776"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:22:01.649000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20120620-ac",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20120620-ac"
},
{
"title": "26198",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=26198"
},
{
"title": "Update Rollup for ActiveX Kill Bits (2736233)",
"trust": 0.8,
"url": "http://technet.microsoft.com/en-us/security/advisory/2736233"
},
{
"title": "Java SE Development Kit 7, Update 9 (JDK 7u9)",
"trust": 0.8,
"url": "http://www.oracle.com/technetwork/java/javase/7u9-relnotes-1863279.html"
},
{
"title": "Java SE Development Kit 6, Update 37 (JDK 6u37)",
"trust": 0.8,
"url": "http://www.oracle.com/technetwork/java/javase/6u37-relnotes-1863283.html"
},
{
"title": "cisco-sa-20120620-ac",
"trust": 0.8,
"url": "http://www.cisco.com/cisco/web/support/jp/111/1115/1115492_cisco-sa-20120620-ac-j.html"
},
{
"title": "ActiveX \u306e Kill Bit \u66f4\u65b0\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u30ed\u30fc\u30eb\u30a2\u30c3\u30d7 (2736233)",
"trust": 0.8,
"url": "http://technet.microsoft.com/ja-jp/security/advisory/2736233"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-002812"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-55776"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002812"
},
{
"db": "NVD",
"id": "CVE-2012-2495"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20120620-ac"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2495"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2495"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/19867"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
},
{
"trust": 0.3,
"url": "http://technet.microsoft.com/en-us/security/advisory/2736233"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-12-149/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-55776"
},
{
"db": "BID",
"id": "54108"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002812"
},
{
"db": "NVD",
"id": "CVE-2012-2495"
},
{
"db": "CNNVD",
"id": "CNNVD-201206-375"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-55776"
},
{
"db": "BID",
"id": "54108"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002812"
},
{
"db": "NVD",
"id": "CVE-2012-2495"
},
{
"db": "CNNVD",
"id": "CNNVD-201206-375"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-06-20T00:00:00",
"db": "VULHUB",
"id": "VHN-55776"
},
{
"date": "2012-06-20T00:00:00",
"db": "BID",
"id": "54108"
},
{
"date": "2012-06-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-002812"
},
{
"date": "2012-06-20T20:55:02.590000",
"db": "NVD",
"id": "CVE-2012-2495"
},
{
"date": "2012-06-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201206-375"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-06-21T00:00:00",
"db": "VULHUB",
"id": "VHN-55776"
},
{
"date": "2015-03-19T08:41:00",
"db": "BID",
"id": "54108"
},
{
"date": "2012-12-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-002812"
},
{
"date": "2012-06-21T04:00:00",
"db": "NVD",
"id": "CVE-2012-2495"
},
{
"date": "2012-06-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201206-375"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201206-375"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco AnyConnect Secure Mobility Client and Cisco Secure Desktop Vulnerabilities forced to downgrade",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-002812"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201206-375"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.