var-201512-0393
Vulnerability from variot
The random-number generator on Cisco Small Business RV routers 4.x and SA500 security appliances 2.2.07 does not have sufficient entropy, which makes it easier for remote attackers to determine a TLS key pair via unspecified computations upon handshake key-exchange data, aka Bug ID CSCus15224. Vendors have confirmed this vulnerability Bug ID CSCus15224 It is released as.Through unspecified calculations in the handshake of key exchange data by a third party, TLS Key pairs may be identified. The Cisco Small Business RV Series Routers provide virtual private network technology remotely. An attacker can exploit this issue to obtain sensitive information by conducting a man-in-the-middle attack. This may lead to other attacks. This issue is being tracked by following Cisco Bug IDs: CSCus15224 CSCus15238 CSCus15436 CSCus15440 CSCus15446 CSCus15451 CSCus15463
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201512-0393", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rv082 dual wan vpn router", "scope": "eq", "trust": 2.7, "vendor": "cisco", "version": "4.0.2.8" }, { "model": "rv082 dual wan vpn router", "scope": "eq", "trust": 2.1, "vendor": "cisco", "version": "4.0.0.7" }, { "model": "rv042 dual wan vpn router", "scope": "eq", "trust": 2.1, "vendor": "cisco", "version": "4.0.2.8" }, { "model": "sa520", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "2.2.07" }, { "model": "rv016 multi-wan vpn", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.0.0.7" }, { "model": "rv042g dual gigabit wan vpn", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.2.2.8" }, { "model": "sa540", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "2.2.07" }, { "model": "rv042g dual gigabit wan vpn", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.0.0.7" }, { "model": "rv016 multi-wan vpn", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.0.5.0" }, { "model": "rv042g dual gigabit wan vpn", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.2.2.7" }, { "model": "sa520w", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "2.2.07" }, { "model": "rv016 multi-wan vpn", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.0.2.8" }, { "model": "rv042g dual gigabit wan vpn router", "scope": "eq", "trust": 1.1, "vendor": "cisco", "version": "4.2.2.8" }, { "model": "rv042g dual gigabit wan vpn router", "scope": "eq", "trust": 1.1, "vendor": "cisco", "version": "4.2.2.7" }, { "model": "rv042g dual gigabit wan vpn router", "scope": "eq", "trust": 1.1, "vendor": "cisco", "version": "4.2.1.2" }, { "model": "rv016 multi-wan vpn router", "scope": "eq", "trust": 1.1, "vendor": "cisco", "version": "4.0.5.0" }, { "model": "rv016 multi-wan vpn router", "scope": "eq", "trust": 1.1, "vendor": "cisco", "version": "4.0.2.8" }, { "model": "rv016 multi-wan vpn router", "scope": "eq", "trust": 1.1, "vendor": "cisco", "version": "4.0.0.7" }, { "model": "sa520 security appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "2.2.07" }, { "model": "sa520w security appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "2.2.07" }, { "model": "sa540 security appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "2.2.07" }, { "model": "small business rv", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.x" }, { "model": "sa540 security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.7" }, { "model": "sa520w security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.7" }, { "model": "sa520 security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.7" }, { "model": "rv082 dual wan vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.2.8" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-08068" }, { "db": "BID", "id": "78876" }, { "db": "JVNDB", "id": "JVNDB-2015-006398" }, { "db": "NVD", "id": "CVE-2015-6418" }, { "db": "CNNVD", "id": "CNNVD-201512-401" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:sa520:2.2.07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:sa540:2.2.07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:sa520w:2.2.07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:rv082_dual_wan_vpn_router_firmware:4.0.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:rv042g_dual_gigabit_wan_vpn_firmware:4.0.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:rv016_multi-wan_vpn_firmware:4.0.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:rv016_multi-wan_vpn_firmware:4.0.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:rv042_dual_wan_vpn_router_firmware:4.0.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:rv082_dual_wan_vpn_router_firmware:4.0.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:rv016_multi-wan_vpn_firmware:4.0.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:rv042g_dual_gigabit_wan_vpn_firmware:4.2.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:rv042g_dual_gigabit_wan_vpn_firmware:4.2.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6418" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "78876" } ], "trust": 0.3 }, "cve": "CVE-2015-6418", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-6418", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2015-08068", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-84379", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-6418", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-08068", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201512-401", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-84379", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2015-6418", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-08068" }, { "db": "VULHUB", "id": "VHN-84379" }, { "db": "VULMON", "id": "CVE-2015-6418" }, { "db": "JVNDB", "id": "JVNDB-2015-006398" }, { "db": "NVD", "id": "CVE-2015-6418" }, { "db": "CNNVD", "id": "CNNVD-201512-401" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The random-number generator on Cisco Small Business RV routers 4.x and SA500 security appliances 2.2.07 does not have sufficient entropy, which makes it easier for remote attackers to determine a TLS key pair via unspecified computations upon handshake key-exchange data, aka Bug ID CSCus15224. Vendors have confirmed this vulnerability Bug ID CSCus15224 It is released as.Through unspecified calculations in the handshake of key exchange data by a third party, TLS Key pairs may be identified. The Cisco Small Business RV Series Routers provide virtual private network technology remotely. \nAn attacker can exploit this issue to obtain sensitive information by conducting a man-in-the-middle attack. This may lead to other attacks. \nThis issue is being tracked by following Cisco Bug IDs:\nCSCus15224\nCSCus15238\nCSCus15436\nCSCus15440\nCSCus15446\nCSCus15451\nCSCus15463", "sources": [ { "db": "NVD", "id": "CVE-2015-6418" }, { "db": "JVNDB", "id": "JVNDB-2015-006398" }, { "db": "CNVD", "id": "CNVD-2015-08068" }, { "db": "BID", "id": "78876" }, { "db": "VULHUB", "id": "VHN-84379" }, { "db": "VULMON", "id": "CVE-2015-6418" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-6418", "trust": 3.5 }, { "db": "BID", "id": "78876", "trust": 2.1 }, { "db": "SECTRACK", "id": "1034409", "trust": 1.2 }, { "db": "SECTRACK", "id": "1034408", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2015-006398", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201512-401", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-08068", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-84379", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-6418", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-08068" }, { "db": "VULHUB", "id": "VHN-84379" }, { "db": "VULMON", "id": "CVE-2015-6418" }, { "db": "BID", "id": "78876" }, { "db": "JVNDB", "id": "JVNDB-2015-006398" }, { "db": "NVD", "id": "CVE-2015-6418" }, { "db": "CNNVD", "id": "CNNVD-201512-401" } ] }, "id": "VAR-201512-0393", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-08068" }, { "db": "VULHUB", "id": "VHN-84379" } ], "trust": 1.2871463342857141 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-08068" } ] }, "last_update_date": "2023-12-18T13:24:40.181000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20151210-dwvr", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151210-dwvr" }, { "title": "Patch for Cisco Small Business RV Router Information Disclosure Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/68148" }, { "title": "Cisco Small Business RV Series Routers and SA500 Series Security Appliances Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=59216" }, { "title": "Cisco: Cisco Small Business RV Series and SA500 Series Dual WAN VPN Router Generated Key Pair Information Disclosure Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20151210-dwvr" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-08068" }, { "db": "VULMON", "id": "CVE-2015-6418" }, { "db": "JVNDB", "id": "JVNDB-2015-006398" }, { "db": "CNNVD", "id": "CNNVD-201512-401" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84379" }, { "db": "JVNDB", "id": "JVNDB-2015-006398" }, { "db": "NVD", "id": "CVE-2015-6418" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151210-dwvr" }, { "trust": 1.3, "url": "http://www.securityfocus.com/bid/78876" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1034408" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1034409" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6418" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6418" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/200.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-08068" }, { "db": "VULHUB", "id": "VHN-84379" }, { "db": "VULMON", "id": "CVE-2015-6418" }, { "db": "BID", "id": "78876" }, { "db": "JVNDB", "id": "JVNDB-2015-006398" }, { "db": "NVD", "id": "CVE-2015-6418" }, { "db": "CNNVD", "id": "CNNVD-201512-401" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-08068" }, { "db": "VULHUB", "id": "VHN-84379" }, { "db": "VULMON", "id": "CVE-2015-6418" }, { "db": "BID", "id": "78876" }, { "db": "JVNDB", "id": "JVNDB-2015-006398" }, { "db": "NVD", "id": "CVE-2015-6418" }, { "db": "CNNVD", "id": "CNNVD-201512-401" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2015-08068" }, { "date": "2015-12-13T00:00:00", "db": "VULHUB", "id": "VHN-84379" }, { "date": "2015-12-13T00:00:00", "db": "VULMON", "id": "CVE-2015-6418" }, { "date": "2015-12-10T00:00:00", "db": "BID", "id": "78876" }, { "date": "2015-12-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006398" }, { "date": "2015-12-13T03:59:09.477000", "db": "NVD", "id": "CVE-2015-6418" }, { "date": "2015-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201512-401" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2015-08068" }, { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-84379" }, { "date": "2016-12-07T00:00:00", "db": "VULMON", "id": "CVE-2015-6418" }, { "date": "2015-12-10T00:00:00", "db": "BID", "id": "78876" }, { "date": "2015-12-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006398" }, { "date": "2016-12-07T18:20:12.883000", "db": "NVD", "id": "CVE-2015-6418" }, { "date": "2015-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201512-401" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-401" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Small Business RV Router and SA500 Security Appliance In the random number generator running on TLS Vulnerabilities that identify key pairs", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006398" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-401" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.