VAR-201706-0069

Vulnerability from variot - Updated: 2023-12-18 12:37

Blue Coat Advanced Secure Gateway 6.6, CacheFlow 3.4, ProxySG 6.5 and 6.6 allows remote attackers to bypass blocked requests, user authentication, and payload scanning. BlueCoatAdvancedSecureGateway, CacheFlow and ProxySG are products of BlueCoatSystems, USA. BlueCoatAdvancedSecureGateway is a secure web gateway device; CacheFlow is a network accelerator; ProxySG is a switch. BlueCoatAdvancedSecureGateway, CacheFlow, and ProxySG have security vulnerabilities. Multiple Blue Coat products are prone to a security-bypass vulnerability. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. The following products are vulnerable: Blue Coat ProxySG 6.5 and 6.6 Blue Coat ASG 6.6 Blue Coat CacheFlow 3.4

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0069",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "proxysg",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "bluecoat",
        "version": "6.6"
      },
      {
        "model": "cacheflow",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "bluecoat",
        "version": "3.4"
      },
      {
        "model": "proxysg",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "bluecoat",
        "version": "6.5"
      },
      {
        "model": "advanced secure gateway",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "bluecoat",
        "version": "6.6"
      },
      {
        "model": "coat systems proxysg",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "blue",
        "version": "6.5"
      },
      {
        "model": "coat systems proxysg",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "blue",
        "version": "6.6"
      },
      {
        "model": "coat systems advanced secure gateway",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "blue",
        "version": "6.6"
      },
      {
        "model": "coat systems cacheflow",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "blue",
        "version": "3.4"
      },
      {
        "model": "advanced secure gateway",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "blue coat",
        "version": "6.6"
      },
      {
        "model": "cacheflow",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "blue coat",
        "version": "3.4"
      },
      {
        "model": "proxysg",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "blue coat",
        "version": "6.5"
      },
      {
        "model": "proxysg",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "blue coat",
        "version": "6.6"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-15526"
      },
      {
        "db": "BID",
        "id": "91404"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008649"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6594"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-293"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:bluecoat:advanced_secure_gateway:6.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:bluecoat:cacheflow:3.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:bluecoat:proxysg:6.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:bluecoat:proxysg:6.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-6594"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mike Brooks and Nathan Fowler.",
    "sources": [
      {
        "db": "BID",
        "id": "91404"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2016-6594",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2016-6594",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-15526",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-95414",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "impactScore": 3.6,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2016-6594",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2016-6594",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-15526",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201706-293",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-95414",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-15526"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95414"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008649"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6594"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-293"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Blue Coat Advanced Secure Gateway 6.6, CacheFlow 3.4, ProxySG 6.5 and 6.6 allows remote attackers to bypass blocked requests, user authentication, and payload scanning. BlueCoatAdvancedSecureGateway, CacheFlow and ProxySG are products of BlueCoatSystems, USA. BlueCoatAdvancedSecureGateway is a secure web gateway device; CacheFlow is a network accelerator; ProxySG is a switch. BlueCoatAdvancedSecureGateway, CacheFlow, and ProxySG have security vulnerabilities. Multiple Blue Coat products are prone to a security-bypass vulnerability. \nSuccessfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. \nThe following products are vulnerable:\nBlue Coat ProxySG 6.5 and 6.6\nBlue Coat ASG 6.6\nBlue Coat CacheFlow 3.4",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-6594"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008649"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-15526"
      },
      {
        "db": "BID",
        "id": "91404"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95414"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-6594",
        "trust": 3.1
      },
      {
        "db": "BID",
        "id": "91404",
        "trust": 2.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008649",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-293",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-15526",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-95414",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-15526"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95414"
      },
      {
        "db": "BID",
        "id": "91404"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008649"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6594"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-293"
      }
    ]
  },
  "id": "VAR-201706-0069",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-15526"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95414"
      }
    ],
    "trust": 0.995906
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-15526"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:37:22.197000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SA130 : Security Control Bypass Vulnerability in ProxySG, ASG, and CacheFlow",
        "trust": 0.8,
        "url": "https://www.symantec.com/security-center/network-protection-security-advisories/sa130"
      },
      {
        "title": "A variety of BlueCoat products safely bypass the patch of the vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/98416"
      },
      {
        "title": "Blue Coat Advanced Secure Gateway , CacheFlow  and ProxySG Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=71216"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-15526"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008649"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-293"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-254",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95414"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008649"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6594"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://bto.bluecoat.com/security-advisory/sa130"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/91404"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6594"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6594"
      },
      {
        "trust": 0.3,
        "url": "https://www.bluecoat.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-15526"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95414"
      },
      {
        "db": "BID",
        "id": "91404"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008649"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6594"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-293"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-15526"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95414"
      },
      {
        "db": "BID",
        "id": "91404"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008649"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6594"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-293"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-15526"
      },
      {
        "date": "2017-06-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-95414"
      },
      {
        "date": "2016-06-23T00:00:00",
        "db": "BID",
        "id": "91404"
      },
      {
        "date": "2017-07-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-008649"
      },
      {
        "date": "2017-06-08T20:29:00.280000",
        "db": "NVD",
        "id": "CVE-2016-6594"
      },
      {
        "date": "2017-06-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201706-293"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-15526"
      },
      {
        "date": "2017-06-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-95414"
      },
      {
        "date": "2016-06-23T00:00:00",
        "db": "BID",
        "id": "91404"
      },
      {
        "date": "2017-07-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-008649"
      },
      {
        "date": "2017-06-24T01:29:00.190000",
        "db": "NVD",
        "id": "CVE-2016-6594"
      },
      {
        "date": "2017-07-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201706-293"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-293"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Blue Coat Vulnerabilities that prevent blocked requests in the product",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008649"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-293"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…