VAR-202108-0713
Vulnerability from variot - Updated: 2023-12-18 13:01A vulnerability was reported in Lenovo Smart Camera X3, X5, and C2E that could allow command injection by setting a specially crafted network configuration. This vulnerability is the same as CNVD-2020-68652. (DoS) It may be in a state. Shenzhen Qiaoan Technology Co., Ltd. is a professional R&D and manufacturer of surveillance cameras, specializing in the production of Qiaoan surveillance, Qiaoan surveillance cameras, etc.
Several webcams of Shenzhen Qiaoan Technology Co., Ltd. have information disclosure vulnerabilities, which can be exploited by attackers to obtain sensitive information
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202108-0713",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "smart camera x3",
"scope": "lt",
"trust": 1.0,
"vendor": "lenovo",
"version": "01.03.29.16"
},
{
"model": "smart camera c2e",
"scope": "lt",
"trust": 1.0,
"vendor": "lenovo",
"version": "01.03.29.16"
},
{
"model": "smart camera x5",
"scope": "lt",
"trust": 1.0,
"vendor": "lenovo",
"version": "01.03.29.16"
},
{
"model": "smart camera x5",
"scope": null,
"trust": 0.8,
"vendor": "lenovo",
"version": null
},
{
"model": "smart camera c2e",
"scope": null,
"trust": 0.8,
"vendor": "lenovo",
"version": null
},
{
"model": "smart camera x3",
"scope": null,
"trust": 0.8,
"vendor": "lenovo",
"version": null
},
{
"model": "ja-770",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-c7m",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-c1k",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-f2t",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-f2c",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-g4r",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-f2t-l",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-q7m",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-q7",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-f8",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-f2e",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-q10",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-q3",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-c10",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-f2t-n",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-q13c",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-f10",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-c10e",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-f2r",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-q3r",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-c6k",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-f2k",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-q7k",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-f2k-4x",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-c5",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-q8",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-c9",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-q5",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-a6",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-q7r",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-g4c",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
},
{
"model": "ja-c6",
"scope": "eq",
"trust": 0.6,
"vendor": "qiaoan",
"version": "01.03.29.14"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-68652"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-011046"
},
{
"db": "NVD",
"id": "CVE-2021-3617"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:lenovo:smart_camera_c2e_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "01.03.29.16",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:lenovo:smart_camera_c2e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:lenovo:smart_camera_x3_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "01.03.29.16",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:lenovo:smart_camera_x3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:lenovo:smart_camera_x5_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "01.03.29.16",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:lenovo:smart_camera_x5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2021-3617"
}
]
},
"cve": "CVE-2021-3617",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2021-3617",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-68652",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 7.2,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2021-011046",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2021-3617",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "psirt@lenovo.com",
"id": "CVE-2021-3617",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2020-68652",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202108-1582",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-68652"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-011046"
},
{
"db": "NVD",
"id": "CVE-2021-3617"
},
{
"db": "NVD",
"id": "CVE-2021-3617"
},
{
"db": "CNNVD",
"id": "CNNVD-202108-1582"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability was reported in Lenovo Smart Camera X3, X5, and C2E that could allow command injection by setting a specially crafted network configuration. This vulnerability is the same as CNVD-2020-68652. (DoS) It may be in a state. Shenzhen Qiaoan Technology Co., Ltd. is a professional R\u0026D and manufacturer of surveillance cameras, specializing in the production of Qiaoan surveillance, Qiaoan surveillance cameras, etc. \n\r\n\r\nSeveral webcams of Shenzhen Qiaoan Technology Co., Ltd. have information disclosure vulnerabilities, which can be exploited by attackers to obtain sensitive information",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-3617"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-011046"
},
{
"db": "CNVD",
"id": "CNVD-2020-68652"
},
{
"db": "VULMON",
"id": "CVE-2021-3617"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-3617",
"trust": 3.3
},
{
"db": "CNVD",
"id": "CNVD-2020-68652",
"trust": 2.3
},
{
"db": "JVNDB",
"id": "JVNDB-2021-011046",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-202108-1582",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2021-3617",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-68652"
},
{
"db": "VULMON",
"id": "CVE-2021-3617"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-011046"
},
{
"db": "NVD",
"id": "CVE-2021-3617"
},
{
"db": "CNNVD",
"id": "CNNVD-202108-1582"
}
]
},
"id": "VAR-202108-0713",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 1.0
},
"last_update_date": "2023-12-18T13:01:14.501000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "LEN-49262",
"trust": 0.8,
"url": "https://iknow.lenovo.com.cn/detail/dc_198417.html"
},
{
"title": "Lenovo Smart Camera Fixes for command injection vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=160997"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-011046"
},
{
"db": "CNNVD",
"id": "CNNVD-202108-1582"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-77",
"trust": 1.0
},
{
"problemtype": "Command injection (CWE-77) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-011046"
},
{
"db": "NVD",
"id": "CVE-2021-3617"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://www.cnvd.org.cn/flaw/show/cnvd-2020-68652"
},
{
"trust": 1.7,
"url": "https://iknow.lenovo.com.cn/detail/dc_198417.html"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3617"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2021-3617"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-011046"
},
{
"db": "NVD",
"id": "CVE-2021-3617"
},
{
"db": "CNNVD",
"id": "CNNVD-202108-1582"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2020-68652"
},
{
"db": "VULMON",
"id": "CVE-2021-3617"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-011046"
},
{
"db": "NVD",
"id": "CVE-2021-3617"
},
{
"db": "CNNVD",
"id": "CNNVD-202108-1582"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-01-04T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-68652"
},
{
"date": "2021-08-17T00:00:00",
"db": "VULMON",
"id": "CVE-2021-3617"
},
{
"date": "2022-07-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-011046"
},
{
"date": "2021-08-17T17:15:07.610000",
"db": "NVD",
"id": "CVE-2021-3617"
},
{
"date": "2021-08-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202108-1582"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-12-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-68652"
},
{
"date": "2021-08-17T00:00:00",
"db": "VULMON",
"id": "CVE-2021-3617"
},
{
"date": "2022-07-15T04:57:00",
"db": "JVNDB",
"id": "JVNDB-2021-011046"
},
{
"date": "2021-08-30T18:41:44.507000",
"db": "NVD",
"id": "CVE-2021-3617"
},
{
"date": "2021-08-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202108-1582"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202108-1582"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0Lenovo\u00a0Smart\u00a0Camera\u00a0 Command injection vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-011046"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "command injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202108-1582"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…