cve-2009-2481
Vulnerability from cvelistv5
Published
2009-07-16 16:00
Modified
2024-08-07 05:52
Severity ?
EPSS score ?
Summary
mt-wizard.cgi in Six Apart Movable Type before 4.261, when global templates are not initialized, allows remote attackers to bypass access restrictions and (1) send e-mail to arbitrary addresses or (2) obtain sensitive information via unspecified vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:52:14.744Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVN#08369659", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN08369659/index.html" }, { "name": "35534", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35534" }, { "name": "ADV-2009-1668", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1668" }, { "name": "JVNDB-2009-000043", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000043.html" }, { "name": "35471", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35471" }, { "name": "movabletype-mtwizard-security-bypass(51330)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51330" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-06-24T00:00:00", "descriptions": [ { "lang": "en", "value": "mt-wizard.cgi in Six Apart Movable Type before 4.261, when global templates are not initialized, allows remote attackers to bypass access restrictions and (1) send e-mail to arbitrary addresses or (2) obtain sensitive information via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "JVN#08369659", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN08369659/index.html" }, { "name": "35534", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35534" }, { "name": "ADV-2009-1668", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1668" }, { "name": "JVNDB-2009-000043", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000043.html" }, { "name": "35471", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35471" }, { "name": "movabletype-mtwizard-security-bypass(51330)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51330" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2481", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mt-wizard.cgi in Six Apart Movable Type before 4.261, when global templates are not initialized, allows remote attackers to bypass access restrictions and (1) send e-mail to arbitrary addresses or (2) obtain sensitive information via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "JVN#08369659", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN08369659/index.html" }, { "name": "35534", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35534" }, { "name": "ADV-2009-1668", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1668" }, { "name": "JVNDB-2009-000043", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000043.html" }, { "name": "35471", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35471" }, { "name": "movabletype-mtwizard-security-bypass(51330)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51330" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2481", "datePublished": "2009-07-16T16:00:00", "dateReserved": "2009-07-16T00:00:00", "dateUpdated": "2024-08-07T05:52:14.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-2481\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-07-16T16:30:00.420\",\"lastModified\":\"2024-11-21T01:04:58.773\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"mt-wizard.cgi in Six Apart Movable Type before 4.261, when global templates are not initialized, allows remote attackers to bypass access restrictions and (1) send e-mail to arbitrary addresses or (2) obtain sensitive information via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"El archivo mt-wizard.cgi en Movable Type de Six Apart anterior a versi\u00f3n 4.261, cuando las plantillas globales no se inicializan, permite a los atacantes remotos omitir las restricciones de acceso y (1) enviar correo electr\u00f3nico a direcciones arbitrarias o (2) obtener informaci\u00f3n confidencial por medio de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"},{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:1.54:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"56106A34-006E-4B73-B6C6-3F36E9C2A355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1731B0E-71C0-4650-BFBF-1FB3865EAE76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:2.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C057E938-243B-4BEE-BF38-F3334A2B9275\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE37614D-A959-4B4A-BF2E-9F3C1072BA20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C1542C3-E6CD-4CF6-9F1D-E8E58F2A11E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47F63E3A-019C-431C-A155-1CD6E42FA485\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13132B94-C271-46F7-9450-FBA1FCBB914E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B584BED2-F630-4A5B-8FE9-29BBE9517214\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.36:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"14FCDA0F-2562-4B58-BF3A-F908AFABC557\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C55BC3C3-83AB-452C-AC2D-A53B3E0C3473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4.20:*:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"C4EFB50C-CC9C-46EC-92C3-A581684354E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4.20:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"E7FEAC67-FA0C-49AE-9AEB-B1E68FB54C8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4.20:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"321A94B3-CDAC-4793-9660-CDCDC614EBAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDDB2948-C902-43FC-9D2E-7EA3775F5A50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.26\",\"matchCriteriaId\":\"230918F1-5CCE-4A03-ABFD-5EF0BC59DF32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.00:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"B1A33E50-6BFD-418F-9F3E-B42C013AA0F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.1:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"DC0F1B54-554E-45C7-8943-A73086C88385\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.2:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"A56CDA00-DC8E-4042-A882-FB6D7D2F43B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.3:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"1C8F4F3A-9942-4263-BC42-CDCDACDFF2E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.4:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"38626110-81A0-4C99-AB8F-D77FDF662887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.5:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"5212ADBE-9F50-4EAB-AC28-91314AA24595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.31:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"3542C36E-E457-46DD-A5F7-BD22E16F1C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.0d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"461319CC-BCDC-4E24-B384-1EEC8B7C4596\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"967DAF27-D561-4FDB-A65C-788551871E5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.01d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD460D1D-5971-491E-863A-D230A0B28ED4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BC178AF-FAF7-49E2-8AE7-1858BD67F44B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CEA1C54-4636-44B1-B620-85F0D870797E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1819A7A1-366A-4168-AE0E-4CE1FF0D3E3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F743E8-72E9-4AEB-B137-A61EB67B8FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE92182C-5BBE-4FCD-959B-E95630D16E17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99E9BE91-D42E-4523-A48E-E7B4FBE7A924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C5935CA-FDE2-4300-8091-DBD0DC4D2081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF080128-CC7C-4F71-9268-B7691D54F358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4783C1BD-B2BA-4D86-A61D-3EB2396DE1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50782308-93FA-4F8F-93FB-4A4E55D95360\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5C968A9-F07A-4C99-B4A5-434E96DDB928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9CD9174-EE47-40B8-8F49-81EAD89267D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"B4FEB07E-4D70-4A24-822E-E4689CB8C9CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"59457028-2EA4-472F-A76F-EF867F48937F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.01:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"ABE24C88-6062-4A36-9852-D9EC818EEA0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.1:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"11C793FA-AE7C-430F-B537-19B788D9BC6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.1:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"F80A607A-66A8-4995-A396-5487B8E3029C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.01:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"C3C21088-A9A5-4CE2-B4D7-8BC48DB84540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.01:b:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"C1DCAD70-9FFF-4950-875D-586937E93473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.01:b:pro:*:*:*:*:*\",\"matchCriteriaId\":\"395B9CE4-EA3A-42A1-AD37-6487911E10D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56195FCE-D933-40C6-A6A3-6AC8CFECA5DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.2:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"448081A9-A8C9-4FEC-879B-7FA11997B4D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.2:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"E7538776-B7B2-4912-BFE3-E7A1033F41E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.12:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"F33F4F69-D670-4698-84C6-EDD9D78F2D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.12:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"1E481C6C-F6EF-4E7D-8DAF-F68407DE6501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AD39A71-0B61-4319-BEE1-12CAD4B095A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.21:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"23B5D056-BC56-4851-8E76-7E22C911EEFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.21:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"CA9BC769-BE45-42EC-8E35-02E6B216D6E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B49D8B0-39C9-480B-9471-1846CE5A2142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.23:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"9A1B400B-FEC9-416B-89F2-C96B1BE11BF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.23:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"1458F0E9-6AF1-44C6-B0EC-7BCF314B0038\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A200E33-641A-41B3-8EB3-E7380B686C8C\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN08369659/index.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000043.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35534\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/35471\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1668\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/51330\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvn.jp/en/jp/JVN08369659/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000043.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35534\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/35471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1668\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/51330\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.