CVE-2017-8106 (GCVE-0-2017-8106)
Vulnerability from cvelistv5
Published
2017-04-24 23:00
Modified
2024-09-16 23:41
Severity ?
CWE
  • n/a
Summary
The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:27:22.210Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.kernel.org/show_bug.cgi?id=195167"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://launchpad.net/bugs/1678676"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-04-24T23:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.kernel.org/show_bug.cgi?id=195167"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://launchpad.net/bugs/1678676"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-8106",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.kernel.org/show_bug.cgi?id=195167",
              "refsource": "MISC",
              "url": "https://bugzilla.kernel.org/show_bug.cgi?id=195167"
            },
            {
              "name": "https://launchpad.net/bugs/1678676",
              "refsource": "MISC",
              "url": "https://launchpad.net/bugs/1678676"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-8106",
    "datePublished": "2017-04-24T23:00:00Z",
    "dateReserved": "2017-04-24T00:00:00Z",
    "dateUpdated": "2024-09-16T23:41:42.454Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2017-8106\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-04-24T23:59:00.753\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n handle_invept de arch/x86/kvm/vmx.c del Kernel de Linux, versiones 3.12 a 3.15, permite a los usuarios privilegiados del sistema operativo hu\u00e9sped de KVM causar una denegaci\u00f3n de servicio (referencia a puntero nulo y ca\u00edda del sistema operativo anfitri\u00f3n) a trav\u00e9s de una instrucci\u00f3n single-context INVEPT con puntero EPT nulo.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B291154A-4B91-4A0E-AAAE-716A8BB7BF99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D835FBA1-49DE-4184-BEC8-7ED2B3F7B0BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"080BD3C9-0606-4D9A-B7AE-3DF9F75B8FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCDF0F11-3DB4-41F6-B6D3-383857884258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FB1772A-F4AA-4AB8-9FC9-10993A6A5B46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DB5B4D7-C79C-448E-B0D4-A6A9C440F49C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C9A32A2-C1EC-4463-B21F-79E6592C5339\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD8683B9-63EF-43D0-8E4F-2909429B47E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91F6A187-E8B1-47CF-B375-FB453F8000F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4332E-E1D4-4B6E-B9FE-B33CCF083402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1949D7D6-7DD2-458B-89D3-B0090C8E9984\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA23201B-8DC1-4694-8DD9-661BC78F152A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDDB83D1-8A25-495E-BC27-0E2059255DEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF8D075-08F5-4CF4-8416-9963CA6B04D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E4ED579-E7D9-434A-A357-3D9056784227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79E9D537-1F1A-462B-A6D6-2DC4FF07A843\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B2AEF20-1F50-497D-AD1E-AC0ED7699DDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93A7B9D2-EF81-4952-AD6F-C5870331F17E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BACD07E-51D7-4081-89E0-276FE3ADCEAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D46AEA84-FDC3-41A3-9F63-D38290C9862F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54C401E0-6258-4F25-82CF-B81B7624C509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0810E4B6-1510-46A6-9519-127E226BDE01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7BA4A7A-FF32-4763-8278-08C2DEBAA05A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B3E44C3-41FC-41A1-9ACF-1DD00DE06CFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860169C6-3AF9-4F00-869C-DE0DE289DF91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51398597-A993-496F-84E4-993B74AC0508\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9879AED-F53E-47D7-ACA1-E61EBF3133EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"048698BF-3B0C-449C-9D2A-81B5CAB4A27F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4EED7A3-B40C-4C02-80B7-1836A3C4C2A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B72AFA7-C594-4BCF-BB79-F3EE675766A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5195ED19-4482-435C-9224-20B0EDF6F114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6AC043B-EACB-406C-B4D0-7B22CF8B0EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA5C700-05F9-4077-ACE6-8A7EE033B464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE74D9A2-DCD6-4E14-B061-972EB7CF1EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50006B4-3AB0-4FF2-9111-F0E1191D243C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B654475F-4C5F-485E-BB77-CFEF6D214C75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A4304FA-0868-4A81-B6E4-FBDF84B153AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2100C16C-437E-4EEC-BD04-D75CF3D02333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EF474B9-2740-498C-909B-DBFD3FDC23CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F0A015-6CF7-4528-9CF9-E0E76CB3E1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09723483-B241-4D82-862C-AA0098F680CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A084853B-91CB-4964-A498-9B4208152138\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A19BA782-DCFB-48B6-973C-3AD050ED51F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F87E856E-AD83-4EBF-BD06-4736B9116083\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04D914E1-7229-4642-BDC9-5A8261E03538\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFDC2E5D-EF73-4DED-8E4C-8309BA53A092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9406CC5F-6D28-4836-BDD4-A50674F1333D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"124ADC63-CDA6-4A27-A844-4F33DB6A4031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40FD9974-27BC-4DE4-9CB0-FC2D0CAA1D46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72559629-4BB1-4651-BEF7-B6E74683C401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8648EF03-5B27-40BD-90A0-59DC8120440B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C26111E-EF43-4CFA-977E-6658A7B62C27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06A8E46E-7CAB-49E2-A1DD-F146FBBBA19E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7799F2BF-9C85-444A-970A-6F245463425F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91854A06-32BC-4C9F-AA63-BA32F2B385DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33509600-67E3-4C78-B0C4-4D62D70FCD94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10237625-21BB-43A0-A7A2-EE662703391E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11E6E8FD-CAA5-4A93-ABD5-815B51D7DE9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C3B5CB0-C094-471A-A6D5-2FBC91384FDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.12.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B77FCA1E-99B4-4D10-9A59-65FE265C9DBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50513044-C297-4D5E-BD45-6FD603A29F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.14.67:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4CB47E3-1DF7-4FB1-A436-F7648C8F0EEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.14.68:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F48C8632-E8C5-4907-AEDC-1B33D8A5AF04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5827B65-9941-4927-8D47-57229EEA290F\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.kernel.org/show_bug.cgi?id=195167\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://launchpad.net/bugs/1678676\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://bugzilla.kernel.org/show_bug.cgi?id=195167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://launchpad.net/bugs/1678676\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…