VAR-201602-0122
Vulnerability from variot - Updated: 2023-12-18 12:06The GMS ViewPoint (GMSVP) web application in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote authenticated users to execute arbitrary commands via vectors related to configuration input. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. Authentication is required to exploit this vulnerability.The specific flaw exists within the GMS ViewPoint (GMSVP) web application. The issue lies in the handling of configuration input due to a failure to safely sanitize user data before executing a command. An attacker could leverage this vulnerability to execute code with root privileges on the underlying operating system. Dell SonicWALL GMS (Global Management System), Analyzer and UMA EM5000 are all products of Dell (Dell). GMS is a global management system for rapid deployment and centralized management of SonicWALL infrastructure. Analyzer is a set of network analyzer software for SonicWALL infrastructure. UMA EM5000 is a set of general management equipment software. The following products and versions are affected: Dell SonicWALL GMS, Analyzer, UMA EM5000 version 7.2, version 8.0, version 8.1 before Hotfix 168056
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201602-0122",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "global management system",
"scope": "eq",
"trust": 1.6,
"vendor": "sonicwall",
"version": "8.0"
},
{
"model": "uma em5000",
"scope": "eq",
"trust": 1.6,
"vendor": "sonicwall",
"version": "8.0"
},
{
"model": "global management system",
"scope": "eq",
"trust": 1.6,
"vendor": "sonicwall",
"version": "7.2"
},
{
"model": "uma em5000",
"scope": "eq",
"trust": 1.6,
"vendor": "sonicwall",
"version": "7.2"
},
{
"model": "analyzer",
"scope": "eq",
"trust": 1.6,
"vendor": "sonicwall",
"version": "8.1"
},
{
"model": "analyzer",
"scope": "eq",
"trust": 1.6,
"vendor": "sonicwall",
"version": "8.0"
},
{
"model": "analyzer",
"scope": "eq",
"trust": 1.6,
"vendor": "sonicwall",
"version": "7.2"
},
{
"model": "uma em5000",
"scope": "eq",
"trust": 1.6,
"vendor": "sonicwall",
"version": "8.1"
},
{
"model": "global management system",
"scope": "eq",
"trust": 1.6,
"vendor": "sonicwall",
"version": "8.1"
},
{
"model": "sonicwall analyzer",
"scope": "eq",
"trust": 0.8,
"vendor": "dell",
"version": "7.2"
},
{
"model": "sonicwall analyzer",
"scope": "eq",
"trust": 0.8,
"vendor": "dell",
"version": "8.0"
},
{
"model": "sonicwall analyzer",
"scope": "eq",
"trust": 0.8,
"vendor": "dell",
"version": "8.1"
},
{
"model": "sonicwall global management system",
"scope": "eq",
"trust": 0.8,
"vendor": "dell",
"version": "7.2"
},
{
"model": "sonicwall global management system",
"scope": "eq",
"trust": 0.8,
"vendor": "dell",
"version": "8.0"
},
{
"model": "sonicwall global management system",
"scope": "eq",
"trust": 0.8,
"vendor": "dell",
"version": "8.1"
},
{
"model": "sonicwall e-class universal management appliance em5000",
"scope": null,
"trust": 0.8,
"vendor": "dell",
"version": null
},
{
"model": "sonicwall e-class universal management appliance em5000",
"scope": "eq",
"trust": 0.8,
"vendor": "dell",
"version": "7.2"
},
{
"model": "sonicwall e-class universal management appliance em5000",
"scope": "eq",
"trust": 0.8,
"vendor": "dell",
"version": "8.0"
},
{
"model": "sonicwall e-class universal management appliance em5000",
"scope": "eq",
"trust": 0.8,
"vendor": "dell",
"version": "8.1"
},
{
"model": "gms virtual appliance",
"scope": null,
"trust": 0.7,
"vendor": "sonicwall",
"version": null
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-164"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001558"
},
{
"db": "NVD",
"id": "CVE-2016-2396"
},
{
"db": "CNNVD",
"id": "CNNVD-201602-322"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:sonicwall:analyzer:7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sonicwall:analyzer:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sonicwall:analyzer:8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sonicwall:global_management_system:7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sonicwall:global_management_system:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sonicwall:global_management_system:8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:sonicwall:uma_em5000_firmware:7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sonicwall:uma_em5000_firmware:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sonicwall:uma_em5000_firmware:8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:sonicwall:uma_em5000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-2396"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "kernelsmith - Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-164"
}
],
"trust": 0.7
},
"cve": "CVE-2016-2396",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2016-2396",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 1.6,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "VHN-91215",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.1,
"impactScore": 6.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-2396",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2016-2396",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2016-2396",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201602-322",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-91215",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2016-2396",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-164"
},
{
"db": "VULHUB",
"id": "VHN-91215"
},
{
"db": "VULMON",
"id": "CVE-2016-2396"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001558"
},
{
"db": "NVD",
"id": "CVE-2016-2396"
},
{
"db": "CNNVD",
"id": "CNNVD-201602-322"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The GMS ViewPoint (GMSVP) web application in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote authenticated users to execute arbitrary commands via vectors related to configuration input. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. Authentication is required to exploit this vulnerability.The specific flaw exists within the GMS ViewPoint (GMSVP) web application. The issue lies in the handling of configuration input due to a failure to safely sanitize user data before executing a command. An attacker could leverage this vulnerability to execute code with root privileges on the underlying operating system. Dell SonicWALL GMS (Global Management System), Analyzer and UMA EM5000 are all products of Dell (Dell). GMS is a global management system for rapid deployment and centralized management of SonicWALL infrastructure. Analyzer is a set of network analyzer software for SonicWALL infrastructure. UMA EM5000 is a set of general management equipment software. The following products and versions are affected: Dell SonicWALL GMS, Analyzer, UMA EM5000 version 7.2, version 8.0, version 8.1 before Hotfix 168056",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-2396"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001558"
},
{
"db": "ZDI",
"id": "ZDI-16-164"
},
{
"db": "VULHUB",
"id": "VHN-91215"
},
{
"db": "VULMON",
"id": "CVE-2016-2396"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-2396",
"trust": 3.3
},
{
"db": "ZDI",
"id": "ZDI-16-164",
"trust": 3.3
},
{
"db": "SECTRACK",
"id": "1035015",
"trust": 1.2
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001558",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3037",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201602-322",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-91215",
"trust": 0.1
},
{
"db": "BID",
"id": "83200",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2016-2396",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-164"
},
{
"db": "VULHUB",
"id": "VHN-91215"
},
{
"db": "VULMON",
"id": "CVE-2016-2396"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001558"
},
{
"db": "NVD",
"id": "CVE-2016-2396"
},
{
"db": "CNNVD",
"id": "CNNVD-201602-322"
}
]
},
"id": "VAR-201602-0122",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-91215"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:06:14.989000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SonicWALL Analyzer Product Notification",
"trust": 0.8,
"url": "https://support.software.dell.com/product-notification/185943"
},
{
"title": "SonicWALL has issued an update to correct this vulnerability. Hotfix 168056",
"trust": 0.7,
"url": "https://www.mysonicwall.com/firmware/downloadcenter.aspx"
},
{
"title": "Multiple Dell Product Any Command Execution Vulnerability Fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60258"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-164"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001558"
},
{
"db": "CNNVD",
"id": "CNNVD-201602-322"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-77",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-91215"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001558"
},
{
"db": "NVD",
"id": "CVE-2016-2396"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-164"
},
{
"trust": 1.8,
"url": "https://support.software.dell.com/product-notification/185943"
},
{
"trust": 1.2,
"url": "http://www.securitytracker.com/id/1035015"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2396"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2396"
},
{
"trust": 0.7,
"url": "https://www.mysonicwall.com/firmware/downloadcenter.aspx"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/77.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.securityfocus.com/bid/83200"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-164"
},
{
"db": "VULHUB",
"id": "VHN-91215"
},
{
"db": "VULMON",
"id": "CVE-2016-2396"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001558"
},
{
"db": "NVD",
"id": "CVE-2016-2396"
},
{
"db": "CNNVD",
"id": "CNNVD-201602-322"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-16-164"
},
{
"db": "VULHUB",
"id": "VHN-91215"
},
{
"db": "VULMON",
"id": "CVE-2016-2396"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001558"
},
{
"db": "NVD",
"id": "CVE-2016-2396"
},
{
"db": "CNNVD",
"id": "CNNVD-201602-322"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-02-10T00:00:00",
"db": "ZDI",
"id": "ZDI-16-164"
},
{
"date": "2016-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-91215"
},
{
"date": "2016-02-17T00:00:00",
"db": "VULMON",
"id": "CVE-2016-2396"
},
{
"date": "2016-03-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-001558"
},
{
"date": "2016-02-17T15:59:06.737000",
"db": "NVD",
"id": "CVE-2016-2396"
},
{
"date": "2016-02-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201602-322"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-02-10T00:00:00",
"db": "ZDI",
"id": "ZDI-16-164"
},
{
"date": "2018-03-12T00:00:00",
"db": "VULHUB",
"id": "VHN-91215"
},
{
"date": "2023-11-07T00:00:00",
"db": "VULMON",
"id": "CVE-2016-2396"
},
{
"date": "2016-03-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-001558"
},
{
"date": "2023-11-07T02:31:10.550000",
"db": "NVD",
"id": "CVE-2016-2396"
},
{
"date": "2016-02-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201602-322"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201602-322"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Dell SonicWALL Product GMS ViewPoint Web An arbitrary command execution vulnerability in the application",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-001558"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201602-322"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.