alsa-2025:1671
Vulnerability from osv_almalinux
Published
2025-02-19 00:00
Modified
2025-02-20 14:55
Summary
Important: mysql security update
Details
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
- openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)
- krb5: GSS message token handling (CVE-2024-37371)
- curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)
- mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)
- mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)
- mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)
- mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)
- mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)
- mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)
- mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)
- mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)
- mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)
- mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)
- mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)
- curl: curl netrc password leak (CVE-2024-11053)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)
- mysql: MySQL Server Options Vulnerability (CVE-2025-21520)
- mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)
- mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)
- mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)
- mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)
- mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)
- mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)
- mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)
- mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)
- mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-errmsg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-test"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. \n\nSecurity Fix(es): \n\n * openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n * krb5: GSS message token handling (CVE-2024-37371)\n * curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)\n * mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)\n * mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)\n * mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)\n * mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)\n * mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)\n * mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)\n * mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)\n * mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)\n * mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)\n * mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)\n * mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)\n * curl: curl netrc password leak (CVE-2024-11053)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)\n * mysql: MySQL Server Options Vulnerability (CVE-2025-21520)\n * mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)\n * mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)\n * mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)\n * mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)\n * mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)\n * mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)\n * mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)\n * mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)\n * mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:1671",
"modified": "2025-02-20T14:55:32Z",
"published": "2025-02-19T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-11053"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21193"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21194"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21196"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21197"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21198"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21199"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21201"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21203"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21212"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21213"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21218"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21219"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21230"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21231"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21236"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21237"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21238"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21239"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21241"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21247"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-5535"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-7264"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21490"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21491"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21494"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21497"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21500"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21501"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21503"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21504"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21505"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21518"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21519"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21520"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21521"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21522"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21523"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21525"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21529"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21531"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21534"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21536"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21540"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21543"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21546"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21555"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21559"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2294581"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2294676"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301888"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318857"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318858"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318870"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318873"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318874"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318876"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318882"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318883"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318884"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318885"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318886"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318897"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318900"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318905"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318914"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318922"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318923"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318925"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318926"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318927"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331191"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339218"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339220"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339221"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339226"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339231"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339236"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339238"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339243"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339247"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339252"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339259"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339266"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339270"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339271"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339275"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339277"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339281"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339284"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339291"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339293"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339295"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339299"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339300"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339304"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339305"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2025-1671.html"
}
],
"related": [
"CVE-2024-5535",
"CVE-2024-37371",
"CVE-2024-7264",
"CVE-2024-21238",
"CVE-2024-21196",
"CVE-2024-21241",
"CVE-2024-21231",
"CVE-2024-21197",
"CVE-2024-21218",
"CVE-2024-21201",
"CVE-2024-21236",
"CVE-2024-21237",
"CVE-2024-21203",
"CVE-2024-21212",
"CVE-2024-21219",
"CVE-2024-21230",
"CVE-2024-21213",
"CVE-2024-21194",
"CVE-2024-21199",
"CVE-2024-21193",
"CVE-2024-21198",
"CVE-2024-21247",
"CVE-2024-21239",
"CVE-2024-11053",
"CVE-2025-21497",
"CVE-2025-21520",
"CVE-2025-21490",
"CVE-2025-21529",
"CVE-2025-21531",
"CVE-2025-21504",
"CVE-2025-21540",
"CVE-2025-21555",
"CVE-2025-21543",
"CVE-2025-21491",
"CVE-2025-21525",
"CVE-2025-21536",
"CVE-2025-21521",
"CVE-2025-21501",
"CVE-2025-21534",
"CVE-2025-21494",
"CVE-2025-21519",
"CVE-2025-21522",
"CVE-2025-21503",
"CVE-2025-21518",
"CVE-2025-21559",
"CVE-2025-21546",
"CVE-2025-21500",
"CVE-2025-21523",
"CVE-2025-21505"
],
"summary": "Important: mysql security update"
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…