fkie_cve-2023-22374
Vulnerability from fkie_nvd
Published
2023-02-01 18:15
Modified
2024-11-21 07:44
Summary
A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Impacted products
Vendor Product Version
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager 13.1.5
f5 big-ip_access_policy_manager 17.0.0
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager 13.1.5
f5 big-ip_advanced_firewall_manager 17.0.0
f5 big-ip_analytics *
f5 big-ip_analytics *
f5 big-ip_analytics *
f5 big-ip_analytics 13.1.5
f5 big-ip_analytics 17.0.0
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_acceleration_manager 13.1.5
f5 big-ip_application_acceleration_manager 17.0.0
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager 13.1.0
f5 big-ip_application_security_manager 17.0.0
f5 big-ip_ddos_hybrid_defender *
f5 big-ip_ddos_hybrid_defender *
f5 big-ip_ddos_hybrid_defender *
f5 big-ip_ddos_hybrid_defender 13.1.5
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system 17.0.0
f5 big-ip_fraud_protection_service *
f5 big-ip_fraud_protection_service *
f5 big-ip_fraud_protection_service 13.1.5
f5 big-ip_fraud_protection_service 17.0.0
f5 big-ip_link_controller *
f5 big-ip_link_controller *
f5 big-ip_link_controller *
f5 big-ip_link_controller 13.1.5
f5 big-ip_link_controller 17.0.0
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager 13.1.5
f5 big-ip_local_traffic_manager 17.0.0
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager 13.1.5
f5 big-ip_policy_enforcement_manager 17.0.0
f5 big-ip_ssl_orchestrator *
f5 big-ip_ssl_orchestrator *
f5 big-ip_ssl_orchestrator *
f5 big-ip_ssl_orchestrator 13.1.5
f5 big-ip_ssl_orchestrator 17.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEFCEE4A-EFF7-4622-964D-29706B0D0788",
              "versionEndIncluding": "14.1.5",
              "versionStartIncluding": "14.1.4.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "65BD1840-28C2-42B7-BE75-081DE24081A3",
              "versionEndIncluding": "15.1.8",
              "versionStartIncluding": "15.1.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D511799-6CEE-4337-BF66-38D7AF4D68C5",
              "versionEndIncluding": "16.1.3",
              "versionStartIncluding": "16.1.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E688B1-28C4-4F9A-9474-381FD22E792D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD637AF5-F7D1-428F-955E-16756B7476E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32BBAAC4-BCC4-4A84-A579-4356EF78AA22",
              "versionEndIncluding": "14.1.5",
              "versionStartIncluding": "14.1.4.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA72ED00-F966-4762-9025-3DB63A1640A3",
              "versionEndIncluding": "15.1.8",
              "versionStartIncluding": "15.1.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0279F4AF-C297-47B3-A1DD-C99DF6AAD215",
              "versionEndIncluding": "16.1.3",
              "versionStartIncluding": "16.1.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "200AC72D-719D-4663-BE05-C9C7826DEA68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8332960-4AAE-4101-8FFF-2D07B6479BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B721D9E-AD2F-44C9-9163-3785AA1A8441",
              "versionEndIncluding": "14.1.5",
              "versionStartIncluding": "14.1.4.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2685F058-2BEF-4189-BFBC-2F223C776A63",
              "versionEndIncluding": "15.1.8",
              "versionStartIncluding": "15.1.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DD896D-ABC7-485B-8810-39BB65DAF76C",
              "versionEndIncluding": "16.1.3",
              "versionStartIncluding": "16.1.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_analytics:13.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "129F1B0B-44E4-4F67-B0B6-43CD2734F30A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_analytics:17.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA0A9081-15D2-44F7-B66E-5C594F7C8066",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC06C851-23E7-4793-9BB0-A1172B78B15F",
              "versionEndIncluding": "15.1.8",
              "versionStartIncluding": "15.1.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAE414B-CD2C-4FE1-9124-6F43040DDFB1",
              "versionEndIncluding": "16.1.3",
              "versionStartIncluding": "16.1.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF66FD8-CDA5-4E44-8A0D-9FF07E8C1E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEBE106-40F1-439C-8154-187D89988C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEFB9B30-9A07-4D28-B3EA-267D257B7E89",
              "versionEndIncluding": "14.1.5",
              "versionStartIncluding": "14.1.4.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "764E6777-2C42-46FE-A266-ABBEB05D0F1A",
              "versionEndIncluding": "15.1.8",
              "versionStartIncluding": "15.1.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D90494BC-DEBB-47A2-9794-BAC0BF670A92",
              "versionEndIncluding": "16.1.3",
              "versionStartIncluding": "16.1.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FDBD38-369B-4007-8D9A-B65B83B2AABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:17.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AB53DF-7335-462E-B8CD-44DF0DCE3826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C278A7AA-1CA3-432D-9C22-772A288CC178",
              "versionEndIncluding": "14.1.5",
              "versionStartIncluding": "14.1.4.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "785DD62D-CA21-40EC-8AF0-8CC36CCB8304",
              "versionEndIncluding": "15.1.8",
              "versionStartIncluding": "15.1.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA133203-B4FE-415D-B9C8-7CDE1A7895D9",
              "versionEndIncluding": "16.1.3",
              "versionStartIncluding": "16.1.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:13.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C73DC4-D85A-49A1-81BD-E9D145E42FF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "019D49C1-4A4D-40EE-8242-A649BE03E38B",
              "versionEndIncluding": "14.1.5",
              "versionStartIncluding": "14.1.4.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E943A8AF-F993-4C1C-ADF1-06519694E4C5",
              "versionEndIncluding": "15.1.8",
              "versionStartIncluding": "15.1.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6A12A83-966B-4B6D-AE49-C1696819E548",
              "versionEndIncluding": "16.1.3",
              "versionStartIncluding": "16.1.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:17.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC4E36FE-C4C7-4C00-A65A-41F50FCE017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B46626AD-CF6B-4A1C-8103-0A616C053E5D",
              "versionEndIncluding": "15.1.8",
              "versionStartIncluding": "15.1.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4842CD17-44B8-456D-9AC7-A295B4D4DBEA",
              "versionEndIncluding": "16.1.3",
              "versionStartIncluding": "16.1.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F933F2D2-1C1D-43F0-9BD2-4699716E4A94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0954BD-CC9C-448F-A9C1-3FB71AB27D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDC74428-66DF-4A88-A6F5-064160B4C72C",
              "versionEndIncluding": "14.1.5",
              "versionStartIncluding": "14.1.4.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "44E0FC7E-30C1-49D7-9B89-4CB747B28CBD",
              "versionEndIncluding": "15.1.8",
              "versionStartIncluding": "15.1.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1647DB93-A49C-4A04-B181-3465427D4B17",
              "versionEndIncluding": "16.1.3",
              "versionStartIncluding": "16.1.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_link_controller:13.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "26873D65-5406-45AF-A7F4-14AF2C55D368",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_link_controller:17.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7B147BB-1B2E-4F40-9FA7-1165B8F0B60D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8155903D-1A5F-482E-B356-526E9A973BBC",
              "versionEndIncluding": "14.1.5",
              "versionStartIncluding": "14.1.4.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3938C6C-6855-4873-89EA-4C8B8EFD571C",
              "versionEndIncluding": "15.1.8",
              "versionStartIncluding": "15.1.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E52120D-FBF7-4687-87A8-BC4AE07DC734",
              "versionEndIncluding": "16.1.3",
              "versionStartIncluding": "16.1.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E37750C-50F3-480A-AA40-23D59F50E4B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "73FB842B-33B1-4AD4-AC61-47192A87A785",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FFF651-F115-4591-BA61-E099DE307168",
              "versionEndIncluding": "14.1.5",
              "versionStartIncluding": "14.1.4.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC136CEA-2431-4D53-B898-E245826A9995",
              "versionEndIncluding": "15.1.8",
              "versionStartIncluding": "15.1.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD177FA-262E-4874-9850-4E8525181ACE",
              "versionEndIncluding": "16.1.3",
              "versionStartIncluding": "16.1.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F754F6FC-2A29-453F-9E9B-39C779830562",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "509A4307-3EC4-4AE7-AF72-3C2B3CF9E754",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "854D89CF-0E69-4BA9-A881-02673E3D91F3",
              "versionEndIncluding": "14.1.5",
              "versionStartIncluding": "14.1.4.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D03D7294-C5CD-4EC1-8200-A998AED7F8E5",
              "versionEndIncluding": "15.1.8",
              "versionStartIncluding": "15.1.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2DACFE8-5E0B-49EC-894E-175591E9C775",
              "versionEndIncluding": "16.1.3",
              "versionStartIncluding": "16.1.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:13.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC4686BF-A9FA-4770-BD06-74BA4CA49FCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "88B13312-1958-4B5C-BD4B-2075F6BF8C98",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "\nA format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.\n\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\n"
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de cadena de formato en iControl SOAP que permite a un atacante autenticado bloquear el proceso CGI de iControl SOAP o, potencialmente, ejecutar c\u00f3digo arbitrario. En el modo de dispositivo BIG-IP, una explotaci\u00f3n exitosa de esta vulnerabilidad puede permitir al atacante cruzar un l\u00edmite de seguridad. Nota: Las versiones de software que han llegado al final del soporte t\u00e9cnico (EoTS) no se eval\u00faan."
    }
  ],
  "id": "CVE-2023-22374",
  "lastModified": "2024-11-21T07:44:39.350",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 6.0,
        "source": "f5sirt@f5.com",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-02-01T18:15:11.363",
  "references": [
    {
      "source": "f5sirt@f5.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://my.f5.com/manage/s/article/K000130415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://my.f5.com/manage/s/article/K000130415"
    }
  ],
  "sourceIdentifier": "f5sirt@f5.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "f5sirt@f5.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…