fkie_cve-2008-1720
Vulnerability from fkie_nvd
Published
2008-04-10 19:05
Modified
2025-04-09 00:30
Severity ?
Summary
Buffer overflow in rsync 2.6.9 to 3.0.1, with extended attribute (xattr) support enabled, might allow remote attackers to execute arbitrary code via unknown vectors.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=125017764422557&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=125017764422557&w=2
secalert@redhat.comhttp://rsync.samba.org/ftp/rsync/security/rsync-3.0.1-xattr-alloc.diffPatch
secalert@redhat.comhttp://samba.anu.edu.au/rsync/security.html#s3_0_2Patch
secalert@redhat.comhttp://secunia.com/advisories/29668
secalert@redhat.comhttp://secunia.com/advisories/29770
secalert@redhat.comhttp://secunia.com/advisories/29777
secalert@redhat.comhttp://secunia.com/advisories/29781
secalert@redhat.comhttp://secunia.com/advisories/29788
secalert@redhat.comhttp://secunia.com/advisories/29856
secalert@redhat.comhttp://secunia.com/advisories/29861
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200804-16.xml
secalert@redhat.comhttp://sourceforge.net/project/shownotes.php?release_id=591462&group_id=69227
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1545
secalert@redhat.comhttp://www.mail-archive.com/rsync-announce%40lists.samba.org/msg00057.html
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:084
secalert@redhat.comhttp://www.osvdb.org/44368
secalert@redhat.comhttp://www.osvdb.org/44369
secalert@redhat.comhttp://www.securityfocus.com/bid/28726
secalert@redhat.comhttp://www.securitytracker.com/id?1019835
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1191/references
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1215/references
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/41766
secalert@redhat.comhttps://usn.ubuntu.com/600-1/
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-April/msg00237.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-April/msg00247.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=125017764422557&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=125017764422557&w=2
af854a3a-2127-422b-91ae-364da2661108http://rsync.samba.org/ftp/rsync/security/rsync-3.0.1-xattr-alloc.diffPatch
af854a3a-2127-422b-91ae-364da2661108http://samba.anu.edu.au/rsync/security.html#s3_0_2Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29668
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29770
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29777
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29781
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29788
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29856
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29861
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-16.xml
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/project/shownotes.php?release_id=591462&group_id=69227
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1545
af854a3a-2127-422b-91ae-364da2661108http://www.mail-archive.com/rsync-announce%40lists.samba.org/msg00057.html
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:084
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/44368
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/44369
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28726
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019835
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1191/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1215/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41766
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/600-1/
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00237.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00247.html
Impacted products
Vendor Product Version
samba rsync 2.6.9
samba rsync 2.7.0
samba rsync 2.7.1
samba rsync 2.7.2
samba rsync 2.7.3
samba rsync 2.7.4
samba rsync 2.7.5
samba rsync 2.7.6
samba rsync 2.7.7
samba rsync 2.7.8
samba rsync 2.7.9
samba rsync 2.8.0
samba rsync 2.8.1
samba rsync 2.8.2
samba rsync 2.8.3
samba rsync 2.8.4
samba rsync 2.8.5
samba rsync 2.8.6
samba rsync 2.8.7
samba rsync 2.8.8
samba rsync 2.8.9
samba rsync 2.9.0
samba rsync 2.9.1
samba rsync 2.9.2
samba rsync 2.9.3
samba rsync 2.9.4
samba rsync 2.9.5
samba rsync 2.9.6
samba rsync 2.9.7
samba rsync 2.9.8
samba rsync 2.9.9
samba rsync 3.0.0
samba rsync 3.0.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA9CA2C-640D-407E-B1A1-B796CD4F4022",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6525C2F-2572-4310-9D30-B198CB384984",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBCAA31-D770-451A-A0FE-7A6E8A99416D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB31395-F275-473B-B86B-B2E758BA2D47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "374E5F91-0E56-4191-B739-4D519DDE9792",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "662396BC-14FB-45C6-9C5B-C557A5DE2E96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A34821C0-3586-4160-B3AD-C49C27EEE05C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7901A8-84D3-4852-A439-C12EB471C21C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AA7B76-8AEB-4B5C-B7F4-82899D200951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "88559A7B-9063-4952-928A-2FE6242D3FB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB40E21F-55FA-4E2F-8A53-3CDF12754882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "23834146-79D3-40F1-857A-339D5BD15DC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7C41B8A-8330-4C5F-A0BA-854E96C3F686",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EAD7F16-C6FD-4499-8CC9-310379DE8CE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B965433-0880-43F3-996F-7F2FAA951B2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9191C5BE-F4CF-4285-AFCE-FB0F58F7868E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBEDC1BF-B858-420D-8471-BE6F9BD766CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D214AC3E-7D71-4019-BF13-3B037F345D10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8056C095-00C3-48A9-8F00-8EC3CA71AE48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "72EA2B26-61BC-4513-9B11-7C21477F93BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEECBA41-4E06-4D26-AD66-1698C39CB4C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "10E73D14-2BBB-4E6E-970D-58C9D678CB07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "58239BB8-F979-4902-807F-7037FA10D13D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D494532E-87C1-435A-B41C-C446EA100FFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF3AD10-C818-4510-AAB3-E760D48FDC2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EB3A011-194C-4F0C-8DA2-48C592C9369A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B29F059-2213-4D01-A704-95A5620AE1DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5774F2C-A9D4-4E92-8832-A7CC2F25B682",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB2845B1-800A-4A87-A11E-94919CBA5655",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4779C728-4B69-4B75-92A2-45E5D41FCC17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:2.9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "99BA0BEE-7C5F-47BD-AE02-68F69E52EA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7313AE31-C2AA-4A06-98BB-0AD3FAB7AAAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:rsync:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44A273A-4613-44DC-905B-8EEDC035799C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in rsync 2.6.9 to 3.0.1, with extended attribute (xattr) support enabled, might allow remote attackers to execute arbitrary code via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en resync2.6.9 a 3.0.1, al activar el soporte de atributos extendidos  (xattr), puede permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2008-1720",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-04-10T19:05:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://rsync.samba.org/ftp/rsync/security/rsync-3.0.1-xattr-alloc.diff"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://samba.anu.edu.au/rsync/security.html#s3_0_2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29668"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29770"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29777"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29781"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29788"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29856"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29861"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-200804-16.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=591462\u0026group_id=69227"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2008/dsa-1545"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mail-archive.com/rsync-announce%40lists.samba.org/msg00057.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:084"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/44368"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/44369"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/28726"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1019835"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1191/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1215/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41766"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://usn.ubuntu.com/600-1/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00237.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00247.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://rsync.samba.org/ftp/rsync/security/rsync-3.0.1-xattr-alloc.diff"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://samba.anu.edu.au/rsync/security.html#s3_0_2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29668"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29770"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29777"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29781"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29788"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29856"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29861"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-16.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=591462\u0026group_id=69227"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1545"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mail-archive.com/rsync-announce%40lists.samba.org/msg00057.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:084"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/44368"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/44369"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28726"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019835"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1191/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1215/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/600-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00237.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00247.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect versions of rsync as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.",
      "lastModified": "2008-04-15T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…