suse-su-2018:1102-1
Vulnerability from csaf_suse
Published
2018-04-27 13:24
Modified
2018-04-27 13:24
Summary
Security update for python-Django
Notes
Title of the patch
Security update for python-Django
Description of the patch
This update for python-Django fixes the following issues:
Security issues fixed:
- CVE-2018-7537: Fixed catastrophic backtracking in django.utils.text.Truncator. (bsc#1083305)
- CVE-2018-7536: Fixed catastrophic backtracking in urlize and urlizetrunc template filters. (bsc#1083304)
- CVE-2017-12794: Fixed XSS possibility in traceback section of technical 500 debug page (bsc#1056284)
- CVE-2017-7234: Open redirect vulnerability in django.views.static.serve() (bsc#1031451)
- CVE-2017-7233: Open redirect and possible XSS attack via user-supplied numeric redirect URLs (bsc#1031450)
- CVE-2016-9014: DNS rebinding vulnerability when DEBUG=True (bsc#1008047)
- CVE-2016-9013: User with hardcoded password created when running tests on Oracle (bsc#1008050)
- CVE-2016-7401: CSRF protection bypass on a site with Google Analytics (bsc#1001374)
- CVE-2016-2512: Vulnerability in the function tils.http.is_safe_url could allow remote users to arbitrary
web site and conduct phishing attacks. (bsc#bnc#967999)
Patchnames
SUSE-OpenStack-Cloud-6-2018-750
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for python-Django", "title": "Title of the patch" }, { "category": "description", "text": "This update for python-Django fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-7537: Fixed catastrophic backtracking in django.utils.text.Truncator. (bsc#1083305)\n- CVE-2018-7536: Fixed catastrophic backtracking in urlize and urlizetrunc template filters. (bsc#1083304)\n- CVE-2017-12794: Fixed XSS possibility in traceback section of technical 500 debug page (bsc#1056284)\n- CVE-2017-7234: Open redirect vulnerability in django.views.static.serve() (bsc#1031451)\n- CVE-2017-7233: Open redirect and possible XSS attack via user-supplied numeric redirect URLs (bsc#1031450)\n- CVE-2016-9014: DNS rebinding vulnerability when DEBUG=True (bsc#1008047)\n- CVE-2016-9013: User with hardcoded password created when running tests on Oracle (bsc#1008050)\n- CVE-2016-7401: CSRF protection bypass on a site with Google Analytics (bsc#1001374)\n- CVE-2016-2512: Vulnerability in the function tils.http.is_safe_url could allow remote users to arbitrary \n web site and conduct phishing attacks. (bsc#bnc#967999)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-6-2018-750", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1102-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1102-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181102-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1102-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003965.html" }, { "category": "self", "summary": "SUSE Bug 1001374", "url": "https://bugzilla.suse.com/1001374" }, { "category": "self", "summary": "SUSE Bug 1008047", "url": "https://bugzilla.suse.com/1008047" }, { "category": "self", "summary": "SUSE Bug 1008050", "url": "https://bugzilla.suse.com/1008050" }, { "category": "self", "summary": "SUSE Bug 1031450", "url": "https://bugzilla.suse.com/1031450" }, { "category": "self", "summary": "SUSE Bug 1031451", "url": "https://bugzilla.suse.com/1031451" }, { "category": "self", "summary": "SUSE Bug 1056284", "url": "https://bugzilla.suse.com/1056284" }, { "category": "self", "summary": "SUSE Bug 1083304", "url": "https://bugzilla.suse.com/1083304" }, { "category": "self", "summary": "SUSE Bug 1083305", "url": "https://bugzilla.suse.com/1083305" }, { "category": "self", "summary": "SUSE Bug 967999", "url": "https://bugzilla.suse.com/967999" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2512 page", "url": "https://www.suse.com/security/cve/CVE-2016-2512/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7401 page", "url": "https://www.suse.com/security/cve/CVE-2016-7401/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9013 page", "url": "https://www.suse.com/security/cve/CVE-2016-9013/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9014 page", "url": "https://www.suse.com/security/cve/CVE-2016-9014/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12794 page", "url": "https://www.suse.com/security/cve/CVE-2017-12794/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7233 page", "url": "https://www.suse.com/security/cve/CVE-2017-7233/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7234 page", "url": "https://www.suse.com/security/cve/CVE-2017-7234/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7536 page", "url": "https://www.suse.com/security/cve/CVE-2018-7536/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7537 page", "url": "https://www.suse.com/security/cve/CVE-2018-7537/" } ], "title": "Security update for python-Django", "tracking": { "current_release_date": "2018-04-27T13:24:32Z", "generator": { "date": "2018-04-27T13:24:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1102-1", "initial_release_date": "2018-04-27T13:24:32Z", "revision_history": [ { "date": "2018-04-27T13:24:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "python-Django-1.8.19-3.6.1.noarch", "product": { "name": "python-Django-1.8.19-3.6.1.noarch", "product_id": "python-Django-1.8.19-3.6.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 6", "product": { "name": "SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-Django-1.8.19-3.6.1.noarch as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" }, "product_reference": "python-Django-1.8.19-3.6.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 6" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2512" } ], "notes": [ { "category": "general", "text": "The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\\@attacker.com.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2512", "url": "https://www.suse.com/security/cve/CVE-2016-2512" }, { "category": "external", "summary": "SUSE Bug 967999 for CVE-2016-2512", "url": "https://bugzilla.suse.com/967999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-27T13:24:32Z", "details": "important" } ], "title": "CVE-2016-2512" }, { "cve": "CVE-2016-7401", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7401" } ], "notes": [ { "category": "general", "text": "The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7401", "url": "https://www.suse.com/security/cve/CVE-2016-7401" }, { "category": "external", "summary": "SUSE Bug 1001374 for CVE-2016-7401", "url": "https://bugzilla.suse.com/1001374" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-27T13:24:32Z", "details": "moderate" } ], "title": "CVE-2016-7401" }, { "cve": "CVE-2016-9013", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9013" } ], "notes": [ { "category": "general", "text": "Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9013", "url": "https://www.suse.com/security/cve/CVE-2016-9013" }, { "category": "external", "summary": "SUSE Bug 1008050 for CVE-2016-9013", "url": "https://bugzilla.suse.com/1008050" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-27T13:24:32Z", "details": "low" } ], "title": "CVE-2016-9013" }, { "cve": "CVE-2016-9014", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9014" } ], "notes": [ { "category": "general", "text": "Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9014", "url": "https://www.suse.com/security/cve/CVE-2016-9014" }, { "category": "external", "summary": "SUSE Bug 1008047 for CVE-2016-9014", "url": "https://bugzilla.suse.com/1008047" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-27T13:24:32Z", "details": "low" } ], "title": "CVE-2016-9014" }, { "cve": "CVE-2017-12794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12794" } ], "notes": [ { "category": "general", "text": "In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn\u0027t affect most production sites since you shouldn\u0027t run with \"DEBUG = True\" (which makes this page accessible) in your production settings.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12794", "url": "https://www.suse.com/security/cve/CVE-2017-12794" }, { "category": "external", "summary": "SUSE Bug 1056284 for CVE-2017-12794", "url": "https://bugzilla.suse.com/1056284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-27T13:24:32Z", "details": "moderate" } ], "title": "CVE-2017-12794" }, { "cve": "CVE-2017-7233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7233" } ], "notes": [ { "category": "general", "text": "Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an \"on success\" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs \"safe\" when they shouldn\u0027t be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7233", "url": "https://www.suse.com/security/cve/CVE-2017-7233" }, { "category": "external", "summary": "SUSE Bug 1031450 for CVE-2017-7233", "url": "https://bugzilla.suse.com/1031450" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-27T13:24:32Z", "details": "low" } ], "title": "CVE-2017-7233" }, { "cve": "CVE-2017-7234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7234" } ], "notes": [ { "category": "general", "text": "A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7234", "url": "https://www.suse.com/security/cve/CVE-2017-7234" }, { "category": "external", "summary": "SUSE Bug 1031451 for CVE-2017-7234", "url": "https://bugzilla.suse.com/1031451" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-27T13:24:32Z", "details": "low" } ], "title": "CVE-2017-7234" }, { "cve": "CVE-2018-7536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7536" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7536", "url": "https://www.suse.com/security/cve/CVE-2018-7536" }, { "category": "external", "summary": "SUSE Bug 1083304 for CVE-2018-7536", "url": "https://bugzilla.suse.com/1083304" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-27T13:24:32Z", "details": "moderate" } ], "title": "CVE-2018-7536" }, { "cve": "CVE-2018-7537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7537" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator\u0027s chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7537", "url": "https://www.suse.com/security/cve/CVE-2018-7537" }, { "category": "external", "summary": "SUSE Bug 1083305 for CVE-2018-7537", "url": "https://bugzilla.suse.com/1083305" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE OpenStack Cloud 6:python-Django-1.8.19-3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-27T13:24:32Z", "details": "moderate" } ], "title": "CVE-2018-7537" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…