CVE-2011-1720 (GCVE-0-2011-1720)
Vulnerability from cvelistv5
Published
2011-05-13 17:00
Modified
2024-08-06 22:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.postfix.org/CVE-2011-1720.html" }, { "name": "44500", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44500" }, { "name": "47778", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/47778" }, { "name": "GLSA-201206-33", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml" }, { "name": "72259", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/72259" }, { "name": "VU#727230", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/727230" }, { "name": "1025521", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025521" }, { "name": "[postfix-announce] 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.postfix.org/announcements/postfix-2.8.3.html" }, { "name": "8247", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8247" }, { "name": "SUSE-SA:2011:023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035" }, { "name": "MDVSA-2011:090", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "DSA-2233", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2233" }, { "name": "USN-1131-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-1131-1" }, { "name": "postfix-cyrus-sasl-code-exec(67359)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.postfix.org/CVE-2011-1720.html" }, { "name": "44500", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44500" }, { "name": "47778", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/47778" }, { "name": "GLSA-201206-33", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml" }, { "name": "72259", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/72259" }, { "name": "VU#727230", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/727230" }, { "name": "1025521", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025521" }, { "name": "[postfix-announce] 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.postfix.org/announcements/postfix-2.8.3.html" }, { "name": "8247", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8247" }, { "name": "SUSE-SA:2011:023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035" }, { "name": "MDVSA-2011:090", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "DSA-2233", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2233" }, { "name": "USN-1131-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-1131-1" }, { "name": "postfix-cyrus-sasl-code-exec(67359)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1720", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded" }, { "name": "http://www.postfix.org/CVE-2011-1720.html", "refsource": "CONFIRM", "url": "http://www.postfix.org/CVE-2011-1720.html" }, { "name": "44500", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44500" }, { "name": "47778", "refsource": "BID", "url": "http://www.securityfocus.com/bid/47778" }, { "name": "GLSA-201206-33", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml" }, { "name": "72259", "refsource": "OSVDB", "url": "http://www.osvdb.org/72259" }, { "name": "VU#727230", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/727230" }, { "name": "1025521", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025521" }, { "name": "[postfix-announce] 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)", "refsource": "MLIST", "url": "http://www.mail-archive.com/postfix-announce@postfix.org/msg00007.html" }, { "name": "http://www.postfix.org/announcements/postfix-2.8.3.html", "refsource": "CONFIRM", "url": "http://www.postfix.org/announcements/postfix-2.8.3.html" }, { "name": "8247", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8247" }, { "name": "SUSE-SA:2011:023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=699035", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035" }, { "name": "MDVSA-2011:090", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "DSA-2233", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2233" }, { "name": "USN-1131-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-1131-1" }, { "name": "postfix-cyrus-sasl-code-exec(67359)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1720", "datePublished": "2011-05-13T17:00:00", "dateReserved": "2011-04-18T00:00:00", "dateUpdated": "2024-08-06T22:37:25.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-1720\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-05-13T17:05:43.207\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.\"},{\"lang\":\"es\",\"value\":\"El servidor SMTP en Postfix anterior a v2.5.13, v2.6.x anterior a v2.6.10, v2.7.x anterior a v2.7.4, y v2.8.x anterior a v2.8.3, cuando ciertos m\u00e9todos Cyrus SASL de autenticaci\u00f3n son activados, no crea un nuevo manejador de servidor despu\u00e9s de que la autentificaci\u00f3n falle, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria libre y ca\u00edda de demonio) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a tra\u00b4ves de un comando AUTH no v\u00e1lido con un m\u00e9todo seguido por un comando AUTH con un m\u00e9todo diferente.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB5D16A3-59DA-407B-82E4-65C39EBD3710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E5DF3A2-5F47-4D2A-802B-CE53872DDEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7A4BE9-7CBE-404F-B577-933AC26E6E81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8872C496-2430-4EA6-B417-51C6877B874A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB9646BA-E57D-4E1D-BF1A-FA137CA00ED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66B95D87-5B0B-48F6-8379-2521CFDE7CA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A09799F5-6084-4F06-B851-4FEA7873BF35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9230082E-FE88-4001-A614-43E8DD76471B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"258010A6-6B75-4663-AD5C-E7AD48B38DEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"602E668A-1343-457B-B0E1-CAB3CCA05BD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C3C7F7-016F-458B-B40D-E06080552045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE51A934-BFD2-4E61-9827-A934995BDCAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDF57DB8-3D17-4868-9FDF-81A0645FBC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BDE9CC6-A7C7-4B0E-A341-E441EF9C33FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D7ECFA4-01CF-4C44-949D-7781767B724A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A568A8FC-7BB0-431B-8BFE-1BF28DD545B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2273956-8CEB-439E-8841-953580AE673D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E074865-92E2-4AFC-8542-00273FDFACEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1274628A-B6F8-48DA-A7B0-7629362A0383\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FAE9B3D-C867-4100-9F1A-1A925E6BCA2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"123ED520-D9A9-457E-B0FF-2164678F2FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F03CC36-4E01-4298-8BF2-208EC2126E2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA763611-3C94-40EB-AC16-F6860FCBFDAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8725859-159E-49A5-91F2-12A6B300AE76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D3B5347-F7FD-4291-8535-9D71F9F49568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2750F62-79D5-41ED-8624-4DC36A23A03D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1D09CC9-07C8-42C7-B7B2-25251C8615A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28A5B6A-466B-4B24-9BD4-9DE15642A724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8E7B624-C991-4EA1-A977-6C06F57B4E2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E899C1C0-18D1-43DE-BC55-C3C14F5395D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F2CA7C-1BCE-4EBB-BFAA-6C27F03CAC9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"903BF741-FD7E-41F7-802D-88A09B7EFFFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F0A444A-E6FE-4585-BA6C-6061A87C6144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"161082B7-A757-496C-9D35-681851CEA10B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02E2034-BB39-4B86-81CA-3BB93A4E4849\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29CF0FA6-F4F6-4A4B-89A6-057F835FFE89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0055B0EA-775F-4670-A3F9-C1676DBB97D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"363704AE-66A9-4B58-A57E-47748F299471\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5226F933-9FB6-4BF6-AC3B-1A22D22F92F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0066AE84-D27D-4E9B-851B-40EDFD07C0BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B739C7B-93CC-4367-B006-E8A721ECBCF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F08A3C19-AEB6-4E0C-A41D-01024DC0A25D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAE8A81E-3856-4908-B7B7-9CF511CA2A21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B935272-1EC7-4C70-8299-9DC7594809EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1647690F-D015-4DC4-9FB7-F5E9F0C430D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A814997B-A612-493F-AA85-BA5A187A91FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"449E9764-54F4-46F9-9E4D-F2C96EC5F37E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF4A15A5-0994-4A3B-B4CD-1C5D9F411FDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3FB858-1B20-450B-9181-A1FE1C2B9DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BBD449-6F03-4EFE-8C87-B5014F0381F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEBD42EA-B31E-4E37-BF28-FEBB18369A18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92BCC42-6E9F-44CB-A755-004B6DBD9D41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B67A4AE-2C1C-49D6-9F53-05CAB51273E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A64D948-9441-492F-B9E5-DE5D5A3D7266\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D7BCB67-AF9E-4343-827B-D783C71BAF46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"265AD494-E5EB-423B-9C20-62BCB1C3B9B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B63D1C8C-6E55-43B1-9479-5CE7A917C501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"208C73B6-88AF-4D8D-A7BE-8AB4E1A4F07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11993437-8CE2-44A7-BEF8-D5F7410DCB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E13F9414-C71A-49A7-9A84-BC3151E95598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"546CC4D9-D2F4-4725-AD2D-200E6549BB63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"998D1069-1CF5-42C5-8668-49D72E2D2F17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2138A68-3F3D-4C7E-9FEB-2C8A445F2789\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED5E0EB5-ECC6-4573-9EA7-83E5741DA3CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"790C02A8-95DD-42BE-8A1C-1C6D6DDCC443\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0034F2-585D-4A98-8428-996A726712DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B162B5-DEF5-46AD-87D1-734B3B637D46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DF3730A-0FFD-4C23-B758-BBA67CC9CD92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10E8E5E2-5674-40D5-AD86-8C4DDB442EE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"690EDC73-47B5-4891-86A5-37B6ED80E145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B751BA4B-B7C8-4A87-A03C-5C91678FC832\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08943D31-2139-45D3-A0DB-0C11C31875CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"591FB74F-BD86-4314-A359-739A245D2642\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F2EF7B2-943F-4DFA-8249-7FC0F9FB0312\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B3AFC1E-01FF-4F91-8C82-5C16378812C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95E552B8-8B26-4DEE-BC6A-BC0B01C42474\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66E26194-A7E6-4A99-8F55-7422A7E9BAB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58097735-FE3B-48B7-B5EA-3CD530E16031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA31260C-1C67-4E76-9F56-2359BFA0B197\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58F1FC50-B6EB-48FD-A2FA-B8BEB05719DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1DE90BD-B5F9-4762-B086-130AB04F3CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCD5258B-C9DE-47BD-9172-27618F220201\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC95B8DD-C8C6-4FC4-81A5-23D7669DA22A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894002C8-F3C1-4241-96FE-C088BBD0FCED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C91BA7D1-2A5B-4721-8E13-6520D6F0114B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBE79FBB-801F-4B1E-8FB8-CB2A1FAF6EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"253DB571-62B7-4015-A758-9DE55AAB8B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7AF9D8C-B11C-4681-84CE-5C86926C85F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955FBDF4-5103-4B19-A5F1-9468F73C7A54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AAC0FF5-9699-4011-8C07-5DDAF13B64A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1262ECC9-7496-4D6B-880E-6CA85EE5CD46\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1E6461-2F2A-49C5-9B2B-08DE418F2F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5B3F710-13EF-4A36-B191-E0FCC1D98E23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFB5988E-D04B-43B9-A980-82FD44D1D198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A1021E-587D-47D3-80E8-43D9CCB4BD72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAC9B923-222D-4F7F-970C-0B9ADF4E86F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D31B75AE-FF82-4B70-BDEC-4B0FA791A085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C148A9D5-8899-4956-BE45-C4DBD4A2BE08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"558A2B97-6582-445F-991C-4DD530E991DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56509587-6CE6-4497-B571-0A014E1FE064\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B24CEB4-4F57-46CB-990B-AB664CEC96EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E40EEF8-F075-4B87-BDE7-C2D1A39B2F80\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5044BFB-4F00-4FFC-9A66-2FDC666B6C2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"827897F6-2A24-45EC-A072-8C02BA726069\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A3CFD6A-86E2-4E7B-BAC2-3163FC7DBF17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7705A10C-0BA3-4F04-B757-5890B6A2A860\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133B8398-2495-47CD-B140-5247ECE86EE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D14612B0-7F74-4ED6-89F9-A11ED75A577F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F5C105E-B22B-48B4-8DC8-5B747792C102\"}]}]}],\"references\":[{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/44500\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201206-33.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/8247\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2233\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/727230\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:090\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/72259\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.postfix.org/CVE-2011-1720.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.postfix.org/announcements/postfix-2.8.3.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/517917/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/47778\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1025521\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-1131-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=699035\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/67359\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/44500\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201206-33.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/8247\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2233\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/727230\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:090\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/72259\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.postfix.org/CVE-2011-1720.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.postfix.org/announcements/postfix-2.8.3.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/517917/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/47778\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1025521\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-1131-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=699035\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/67359\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…