fkie_cve-2010-1849
Vulnerability from fkie_nvd
Published
2010-06-08 00:30
Modified
2024-11-21 01:15
Severity ?
Summary
The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length." }, { "lang": "es", "value": "La funci\u00f3n my_net_skip_rest en sql/net_serv.cc en MySQL v5.0 a v5.0.91 y v5.1 antes de v5.1.47 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (mediante excesivo consumo de CPU y ancho de banda) mediante el env\u00edo de una gran cantidad de paquetes que exceden la longitud m\u00e1xima." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/371.html\r\n\r\n\u0027CWE-371: State Issues\u0027", "id": "CVE-2010-1849", "lastModified": "2024-11-21T01:15:18.843", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-06-08T00:30:01.663", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=50974" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.mysql.com/commits/106060" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1024032" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4435" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=50974" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.mysql.com/commits/106060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1024032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.