fkie_cve-2004-2381
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:53
Severity ?
Summary
HttpRequest.java in Jetty HTTP Server before 4.2.19 allows remote attackers to cause denial of service (memory usage and application crash) via HTTP requests with a large Content-Length.
Impacted products
Vendor Product Version
jetty jetty_http_server 4.0.0
jetty jetty_http_server 4.0.1
jetty jetty_http_server 4.0.1_rc0
jetty jetty_http_server 4.0.1_rc1
jetty jetty_http_server 4.0.1_rc2
jetty jetty_http_server 4.0.2
jetty jetty_http_server 4.0.3
jetty jetty_http_server 4.0.4
jetty jetty_http_server 4.0.5
jetty jetty_http_server 4.0.6
jetty jetty_http_server 4.0.b0
jetty jetty_http_server 4.0.b1
jetty jetty_http_server 4.0.b2
jetty jetty_http_server 4.0.d0
jetty jetty_http_server 4.0.d1
jetty jetty_http_server 4.0.d2
jetty jetty_http_server 4.0.d3
jetty jetty_http_server 4.0.d4
jetty jetty_http_server 4.0_rc1
jetty jetty_http_server 4.0_rc2
jetty jetty_http_server 4.0_rc3
jetty jetty_http_server 4.1.0
jetty jetty_http_server 4.1.0_rc0
jetty jetty_http_server 4.1.0_rc1
jetty jetty_http_server 4.1.0_rc2
jetty jetty_http_server 4.1.0_rc3
jetty jetty_http_server 4.1.0_rc4
jetty jetty_http_server 4.1.0_rc5
jetty jetty_http_server 4.1.0_rc6
jetty jetty_http_server 4.1.1
jetty jetty_http_server 4.1.2
jetty jetty_http_server 4.1.3
jetty jetty_http_server 4.1.4
jetty jetty_http_server 4.1.b0
jetty jetty_http_server 4.1.b1
jetty jetty_http_server 4.1.d0
jetty jetty_http_server 4.1.d1
jetty jetty_http_server 4.1.d2
jetty jetty_http_server 4.2.0
jetty jetty_http_server 4.2.0_beta0
jetty jetty_http_server 4.2.0_rc0
jetty jetty_http_server 4.2.0_rc1
jetty jetty_http_server 4.2.1
jetty jetty_http_server 4.2.2
jetty jetty_http_server 4.2.3
jetty jetty_http_server 4.2.4
jetty jetty_http_server 4.2.4_rc0
jetty jetty_http_server 4.2.5
jetty jetty_http_server 4.2.6
jetty jetty_http_server 4.2.7
jetty jetty_http_server 4.2.8_01
jetty jetty_http_server 4.2.9
jetty jetty_http_server 4.2.9_rc1
jetty jetty_http_server 4.2.9_rc2
jetty jetty_http_server 4.2.10
jetty jetty_http_server 4.2.10_pre0
jetty jetty_http_server 4.2.10_pre1
jetty jetty_http_server 4.2.11
jetty jetty_http_server 4.2.12
jetty jetty_http_server 4.2.14
jetty jetty_http_server 4.2.14_rc0
jetty jetty_http_server 4.2.14_rc1
jetty jetty_http_server 4.2.15
jetty jetty_http_server 4.2.15_rc0
jetty jetty_http_server 4.2.16
jetty jetty_http_server 4.2.17
jetty jetty_http_server 4.2.18



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9B24CDC-1E5B-47C9-8192-F0D1116D90A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F45803E0-D1A7-400D-9CA5-50253AC32401",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.1_rc0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA393091-0662-48B2-8907-99F26477244C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.1_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "22D6CFD2-DBAF-4B4A-B235-98BB4826DBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.1_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CB88D1-A7C1-47A4-9478-B47D945B3905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F059700-FAAF-4F9B-9973-C79A0F6D8299",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3446B000-66B2-42F7-B16D-1D0F06B5A874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0E83837-A974-42B8-8E0B-2DCFE55F6B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "38AD7BA2-57EA-42DA-9CFE-FED77A912FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "71842778-8CE8-4545-B527-994D4BEB92AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.b0:*:*:*:*:*:*:*",
              "matchCriteriaId": "464C37F4-F1EC-4827-8C02-0F7253A29FCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "81965444-CC2B-4002-A7FB-D3EE91AC4AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB7A0330-CDC2-4D95-BF70-E846C480C025",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.d0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E4A7F11-5826-45BE-9E69-717BCE5DAF45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.d1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4528F32-6D57-46CF-B9CF-EB6097033477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.d2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DE9B195-5072-4CA6-984B-A97398789131",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.d3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B156DC85-BD41-49CD-995E-5F144934BE74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0.d4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6C484A2-DDBF-4BEC-89D1-EED071680AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A338593D-C6A7-429C-B440-26F3CCC54C68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "94FADCB4-DE60-463D-8B59-7392CD734603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.0_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CD5D1D-259D-4CA5-A07C-ECEBE8540265",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E64C7C-84FA-4AF0-ADA3-3708DADF35C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.0_rc0:*:*:*:*:*:*:*",
              "matchCriteriaId": "641E07B7-6433-41D5-B420-29FA254F2D27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "268613F8-F1D5-4691-A8B9-6AD7B639D4E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC344802-D51B-4256-B52A-29789ACCF4EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.0_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B4593B-8780-4774-BC1B-923824AB7B7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.0_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD27A440-D06A-47D5-97FF-4B56EDD3E8B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.0_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1651BA40-57D1-40BC-AAFE-4ECE34FF1254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.0_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62CDC27-A264-4E8E-894D-92AD10DC8C01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "35508567-7C83-4C4B-961B-1BE9B8F3D1D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "16AF5579-7763-4851-B7A2-B50A4D589AD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "44BED546-DD64-457E-B93A-CD2069C2068B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D7E37B-448A-4B49-ABC7-57253B43126C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.b0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07346177-D7DE-4545-8BB1-D64D1BDBAAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "65225643-46E4-4B93-BF3A-29DC98BBA92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.d0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF6E1FE3-A09D-4593-A3DA-7700D5021EB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.d1:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D5991E-8CAE-4FDC-A4D7-79D14BB2A4D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.1.d2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D93288E-4ED1-4F4D-875A-AA85F6B853C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B61642-A3F1-4F13-8A3F-A369E1D47F1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.0_beta0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575A31A-DD09-494F-895E-1740ABF4F671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.0_rc0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9622FA39-20BD-4F92-A10A-56B1273A8FAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "74666A8D-0B36-47BF-8873-267C8FD228E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B612838A-DD83-4E67-890E-165692DA4532",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "247F0030-0598-4ADF-8B5D-91BD7CFF7E44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "61AD076A-D4C5-4149-94DE-E43BE78DE83B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C276FEC9-68B0-46BC-92A0-65C3B8401FD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.4_rc0:*:*:*:*:*:*:*",
              "matchCriteriaId": "937F124D-1CE3-405D-A981-760199DA9ED1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D01183-FC99-4FD3-965B-38B1FC39048F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3154BBA-DF19-458F-B8D0-CFCAC7DB366A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "512BF3AF-4013-48E7-9546-5052CFBF0B11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.8_01:*:*:*:*:*:*:*",
              "matchCriteriaId": "9965B682-2CFE-4881-8C0A-26B161731904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "09FD2684-87CF-4B4D-B3D1-7DE43609D2E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.9_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E75206-5C22-47CE-ABC4-960C7D80407B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.9_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA45888D-E2C9-4A17-B699-0C775EFC5FDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0DD62AB-DA57-48B6-9D00-1DBCD4AF111E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.10_pre0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D10D8BC-8C63-45CD-836E-08CC5E6C1676",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.10_pre1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3E86801-E8C2-4DA3-92FD-F89FBB7B53D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82462AC-665D-41C0-B198-AA52784DF4C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B21ED45-9C48-4547-BDCE-7EB12B03AAEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA62A170-2544-4D3D-8E22-21F35D2E9944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.14_rc0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8750DB2-F9CE-4CD6-9C11-733546D56EB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.14_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B72963C-FF0B-4F3F-8D93-8C99C1F43460",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5CEA1C-1EC7-49D7-9485-FA8773DA2D8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.15_rc0:*:*:*:*:*:*:*",
              "matchCriteriaId": "991A0243-5F9E-4E2B-8780-F58B17F9F73C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F68F8E1-BF3C-4C99-BE93-985BB8AD51FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0F5EF68-A6FC-4FD7-8C36-4A8623C60622",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jetty:jetty_http_server:4.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "858FCD10-5B40-4EA8-BA16-081EFC734695",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "HttpRequest.java in Jetty HTTP Server before 4.2.19 allows remote attackers to cause denial of service (memory usage and application crash) via HTTP requests with a large Content-Length."
    }
  ],
  "id": "CVE-2004-2381",
  "lastModified": "2024-11-20T23:53:12.887",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://cvs.sourceforge.net/viewcvs.py/jetty/Jetty/src/org/mortbay/http/HttpRequest.java?r1=1.75\u0026r2=1.76"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/11166/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=224743"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/4387"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/9917"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15537"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cvs.sourceforge.net/viewcvs.py/jetty/Jetty/src/org/mortbay/http/HttpRequest.java?r1=1.75\u0026r2=1.76"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/11166/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=224743"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/4387"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/9917"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15537"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.