VAR-201604-0560
Vulnerability from variot - Updated: 2023-12-18 13:53Buffer overflow in the redirection functionality in Cisco Wireless LAN Controller (WLC) Software 7.2 through 7.4 before 7.4.140.0(MD) and 7.5 through 8.0 before 8.0.115.0(ED) allows remote attackers to execute arbitrary code via a crafted HTTP request, aka Bug ID CSCus25617. The Cisco WLC is responsible for system-wide wireless LAN functions such as security policy, intrusion protection, RF management, quality of service, and mobility. An attacker can exploit this issue to execute arbitrary code on the affected device. Failed exploit attempts will result in denial-of-service conditions. This issue is being tracked by Cisco bug ID CSCus25617. The following releases are affected: Cisco WLC Release 7.2, Release 7.3, Release 7.4 prior to 7.4.140.0(MD), Release 7.5, Release 7.6, Release 8.0 prior to 8.0.115.0(ED)
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201604-0560",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wireless lan controller software",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "7.2.0"
},
{
"model": "wireless lan controller software",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "7.4.140.0"
},
{
"model": "wireless lan controller software",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "7.5.0"
},
{
"model": "wireless lan controller software",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "8.0.115.0"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "8.0.115.0(ed)"
},
{
"model": "wireless lan controller software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "7.4"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "all 7.5 release"
},
{
"model": "wireless lan controller software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "8.0"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "all 7.2 release"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "all 7.3 release"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "all 7.6 release"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "7.4.140.0(md)"
},
{
"model": "wireless lan controller 8.0\u003c8.0.110.0",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "wireless lan controller",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.6"
},
{
"model": "wireless lan controller",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.5"
},
{
"model": "wireless lan controller 7.4\u003c7.4.130.0",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "wireless lan controller",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.3"
},
{
"model": "wireless lan controller",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.2"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.5.102.0"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.4.100"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "8.0.72.140"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.4.1.19"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.4.1.54"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "8.1.0"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.4.100.60"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.6.1.62"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.5.102.11"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.4.1.1"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "NVD",
"id": "CVE-2016-1363"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "7.4.140.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.0.115.0",
"versionStartIncluding": "7.5.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-1363"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "86761"
}
],
"trust": 0.3
},
"cve": "CVE-2016-1363",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2016-1363",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-02518",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-90182",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2016-1363",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-1363",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2016-02518",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201604-512",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-90182",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "VULHUB",
"id": "VHN-90182"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "NVD",
"id": "CVE-2016-1363"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow in the redirection functionality in Cisco Wireless LAN Controller (WLC) Software 7.2 through 7.4 before 7.4.140.0(MD) and 7.5 through 8.0 before 8.0.115.0(ED) allows remote attackers to execute arbitrary code via a crafted HTTP request, aka Bug ID CSCus25617. The Cisco WLC is responsible for system-wide wireless LAN functions such as security policy, intrusion protection, RF management, quality of service, and mobility. \nAn attacker can exploit this issue to execute arbitrary code on the affected device. Failed exploit attempts will result in denial-of-service conditions. \nThis issue is being tracked by Cisco bug ID CSCus25617. The following releases are affected: Cisco WLC Release 7.2, Release 7.3, Release 7.4 prior to 7.4.140.0(MD), Release 7.5, Release 7.6, Release 8.0 prior to 8.0.115.0(ED)",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-1363"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "BID",
"id": "86761"
},
{
"db": "VULHUB",
"id": "VHN-90182"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-1363",
"trust": 3.4
},
{
"db": "SECTRACK",
"id": "1035633",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201604-512",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-02518",
"trust": 0.6
},
{
"db": "BID",
"id": "86761",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-90182",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "VULHUB",
"id": "VHN-90182"
},
{
"db": "BID",
"id": "86761"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "NVD",
"id": "CVE-2016-1363"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
}
]
},
"id": "VAR-201604-0560",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "VULHUB",
"id": "VHN-90182"
}
],
"trust": 1.2126263
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
}
]
},
"last_update_date": "2023-12-18T13:53:12.010000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20160420-htrd",
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160420-htrd"
},
{
"title": "Patch for Cisco WirelessLANController Denial of Service Vulnerability (CNVD-2016-02518)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/74743"
},
{
"title": "Cisco Wireless LAN Controller redirection Fixes for feature buffer overflow vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=61201"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-90182"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "NVD",
"id": "CVE-2016-1363"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160420-htrd"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1035633"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1363"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1363"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "VULHUB",
"id": "VHN-90182"
},
{
"db": "BID",
"id": "86761"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "NVD",
"id": "CVE-2016-1363"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "VULHUB",
"id": "VHN-90182"
},
{
"db": "BID",
"id": "86761"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "NVD",
"id": "CVE-2016-1363"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"date": "2016-04-21T00:00:00",
"db": "VULHUB",
"id": "VHN-90182"
},
{
"date": "2016-04-20T00:00:00",
"db": "BID",
"id": "86761"
},
{
"date": "2016-04-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"date": "2016-04-21T11:00:01.587000",
"db": "NVD",
"id": "CVE-2016-1363"
},
{
"date": "2016-04-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-512"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"date": "2016-12-03T00:00:00",
"db": "VULHUB",
"id": "VHN-90182"
},
{
"date": "2016-04-20T00:00:00",
"db": "BID",
"id": "86761"
},
{
"date": "2016-04-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"date": "2021-04-26T19:07:22.707000",
"db": "NVD",
"id": "CVE-2016-1363"
},
{
"date": "2021-04-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-512"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Wireless LAN Controller Software redirection buffer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.