fkie_cve-2011-0745
Vulnerability from fkie_nvd
Published
2011-03-16 22:55
Modified
2024-11-21 01:24
Severity ?
Summary
SugarCRM before 6.1.3 does not properly handle reloads and direct requests for a warning page produced by a certain duplicate check, which allows remote authenticated users to discover (1) the names of customers via a ShowDuplicates action to the Accounts module, reachable through index.php; or (2) the names of contact persons via a ShowDuplicates action to the Contacts module, reachable through index.php.
Impacted products
Vendor Product Version
sugarcrm sugarcrm *
sugarcrm sugarcrm 1.0
sugarcrm sugarcrm 1.0f
sugarcrm sugarcrm 1.0g
sugarcrm sugarcrm 1.1
sugarcrm sugarcrm 1.1a
sugarcrm sugarcrm 1.1b
sugarcrm sugarcrm 1.1c
sugarcrm sugarcrm 1.1d
sugarcrm sugarcrm 1.1e
sugarcrm sugarcrm 1.1f
sugarcrm sugarcrm 1.5d
sugarcrm sugarcrm 2.0.1
sugarcrm sugarcrm 2.0.1a
sugarcrm sugarcrm 2.0.1c
sugarcrm sugarcrm 3.0.1
sugarcrm sugarcrm 3.5
sugarcrm sugarcrm 3.5.1
sugarcrm sugarcrm 4.0
sugarcrm sugarcrm 4.0.1
sugarcrm sugarcrm 4.1
sugarcrm sugarcrm 4.2
sugarcrm sugarcrm 4.2.1
sugarcrm sugarcrm 4.5.0
sugarcrm sugarcrm 4.5.0f
sugarcrm sugarcrm 4.5.1
sugarcrm sugarcrm 4.5.1
sugarcrm sugarcrm 4.5.1i
sugarcrm sugarcrm 4.5.1o
sugarcrm sugarcrm 5.0.0
sugarcrm sugarcrm 5.0.0
sugarcrm sugarcrm 5.0.0
sugarcrm sugarcrm 5.0.0h
sugarcrm sugarcrm 5.0.0k
sugarcrm sugarcrm 5.1.0
sugarcrm sugarcrm 5.1.0-beta
sugarcrm sugarcrm 5.1c
sugarcrm sugarcrm 5.1l
sugarcrm sugarcrm 5.2.0g
sugarcrm sugarcrm 5.2a
sugarcrm sugarcrm 5.2c
sugarcrm sugarcrm 5.2c
sugarcrm sugarcrm 5.2d
sugarcrm sugarcrm 5.2d
sugarcrm sugarcrm 5.2e
sugarcrm sugarcrm 5.2e
sugarcrm sugarcrm 5.2f
sugarcrm sugarcrm 5.2g
sugarcrm sugarcrm 5.2h
sugarcrm sugarcrm 5.5
sugarcrm sugarcrm 5.5
sugarcrm sugarcrm 5.5.0
sugarcrm sugarcrm 5.5.1
sugarcrm sugarcrm 5.5.2
sugarcrm sugarcrm 5.5.3
sugarcrm sugarcrm 5.5.4
sugarcrm sugarcrm 5.5a
sugarcrm sugarcrm 6.0
sugarcrm sugarcrm 6.0.1
sugarcrm sugarcrm 6.0.2
sugarcrm sugarcrm 6.0.3
sugarcrm sugarcrm 6.1.0
sugarcrm sugarcrm 6.1.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30378EB2-8CB4-402B-86CB-5FE9521F313C",
              "versionEndIncluding": "6.1.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4107E934-D5CF-4ABF-8CB6-0DA90F3D9A74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:1.0f:*:*:*:*:*:*:*",
              "matchCriteriaId": "85742E7F-C06C-46A5-9008-245BE6E4E0BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:1.0g:*:*:*:*:*:*:*",
              "matchCriteriaId": "B820A83B-0F03-4523-9D4D-3EB2930B35F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49FA30E3-7572-4BCC-8EFA-9D259DF892E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:1.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFBB2BDD-5FA2-40E1-9395-A9DED672E3FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:1.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "022D7E5E-BCBC-4E14-9C0D-50E5DD237D76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:1.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E73109-5473-417C-A003-7C1EE1DC3ABC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:1.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "F183CCFF-6D5B-43E7-A70F-E9AEA6E46880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:1.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DA73438-7BA5-4668-90E2-2EECDBBB58A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:1.1f:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6C3E6DF-AE5C-4D7F-99B3-16C3967A6A60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:1.5d:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF53885-8C5B-4654-AB42-587290E58355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A197BD9-85DD-47F2-B30B-6C7F372F6DCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:2.0.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F2BB29-5136-4F23-8D1B-0507A5FCBF13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:2.0.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "603F5E29-5D0B-4872-A125-D7B1CD77BACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "687D4794-4163-4EC8-9673-47E5EF216371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "12DAF9EB-FED5-482D-820E-553E9057B92E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6842129-2DF6-47C9-8960-BF39D1A337C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DF5360C-C07C-413A-9B8C-50907187DAC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED8B842-AAEB-4227-A2D3-64229F4B9FA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4525F5B5-E268-4B50-8244-E8829C106FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "28098D0F-B3E2-470E-92B1-C9138A664496",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F7EFEF-004A-458A-9B3C-3B1B654C6C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACB97DBC-4525-4227-9698-4B05140CCAB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:4.5.0f:*:*:*:*:*:*:*",
              "matchCriteriaId": "58854312-8672-4399-83FB-DF12DF6052F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:4.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "13A8BAEB-B6E3-48AF-90E8-28D7146115AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:4.5.1:*:community_edition:*:*:*:*:*",
              "matchCriteriaId": "D0D2A567-7389-4984-BE45-414BB37CCFD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:4.5.1i:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CE8ADA-3B44-467E-8055-62B92762EAF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:4.5.1o:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A12D16-AC02-4450-AAFC-192CAA5A2BD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "91EAD9ED-CB3E-495F-B62C-047604952312",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.0.0:*:community_edition:*:*:*:*:*",
              "matchCriteriaId": "6B389680-9097-4034-9590-4F172EFFEF2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.0.0:*:sugar_community_edition:*:*:*:*:*",
              "matchCriteriaId": "6FEB4B61-0F95-45CA-AB7A-BA07FF2FCA82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.0.0h:*:sugar_community_edition:*:*:*:*:*",
              "matchCriteriaId": "B23F68DA-DFB0-42E1-959A-F7A68AA83BC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.0.0k:*:sugar_community_edition:*:*:*:*:*",
              "matchCriteriaId": "0C7E5228-8F94-42EA-B0E0-A52E0F05A933",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.1.0:*:sugar_community_edition:*:*:*:*:*",
              "matchCriteriaId": "6E29C3D7-E58A-4F9D-9C2D-9215EBF9F3BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.1.0-beta:*:sugar_community_edition:*:*:*:*:*",
              "matchCriteriaId": "FF69D1EA-2B23-4A9A-A535-A4C59C7DBBD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.1c:*:sugar_community_edition:*:*:*:*:*",
              "matchCriteriaId": "DC04A89E-5379-41B3-BF84-87A2AEB62ED0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.1l:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9163FEC-6827-429B-A020-6728766C63BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.2.0g:*:*:*:*:*:*:*",
              "matchCriteriaId": "699A9586-0683-4DAA-9E5C-662C0630C6EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "439E75C4-C02D-4905-9D73-CE27D6A54C5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.2c:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF95EA0-16E7-4173-AEC8-D66A3F8FB62B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.2c:*:sugar_community_edition:*:*:*:*:*",
              "matchCriteriaId": "F0114CAC-A8F4-489C-818E-DB4E068DAB99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.2d:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFA524F8-A78F-414A-A5AC-1A89901BD917",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.2d:*:sugar_community_edition:*:*:*:*:*",
              "matchCriteriaId": "25E6CA5B-18F8-4C81-A436-6A7FA0E8B45D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.2e:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFCC9802-4642-4331-9D56-4E1F76151E24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.2e:*:sugar_community_edition:*:*:*:*:*",
              "matchCriteriaId": "0B6D79D5-2E61-4C1F-906B-EB16F0D97586",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.2f:*:*:*:*:*:*:*",
              "matchCriteriaId": "7922DB4E-9812-4636-A61D-8D201CE92D93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.2g:*:*:*:*:*:*:*",
              "matchCriteriaId": "57A8ECCF-AAEC-49B1-B474-E4DD14EE7CF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.2h:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC18299-07B6-46BB-93DF-E642FE637395",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.5:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B1E9C26A-6845-45C3-A801-E5F1B5B9B0E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.5:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "EF6C4B76-D1CD-4B58-A9FF-5D35EEAC89EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3943C856-B008-4E66-802B-762D28B679A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D61D60F9-F47C-4956-A9DF-594526C55B43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCDE64A-8C40-4238-B6FA-EA28A39A056A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "33762867-534A-4F49-83B5-A80AE73A43E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F806383-1275-4E86-8791-034E146CC02A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:5.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A03CF9-79B6-4CD2-A3E0-03B7C14DCC27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "850E98DE-3286-4C33-8C79-DE184110078E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07F0B26C-9EF8-4EB0-817C-D17EA0DECF53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "976A3FCD-FFCA-4881-A27D-67557A469EB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F96B0CB-2C92-4785-8BCA-1FC27F05C015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16E5EC2-5F12-4295-A1DC-84D483B41B11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD86E19-E2CF-4A06-9A33-DD225A6014F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SugarCRM before 6.1.3 does not properly handle reloads and direct requests for a warning page produced by a certain duplicate check, which allows remote authenticated users to discover (1) the names of customers via a ShowDuplicates action to the Accounts module, reachable through index.php; or (2) the names of contact persons via a ShowDuplicates action to the Contacts module, reachable through index.php."
    },
    {
      "lang": "es",
      "value": "SugarCRM en versiones anteriores a la 6.1.3 no maneja apropiadamente las recargas y peticiones directas de una p\u00e1gina de advertencia producida por una comprobaci\u00f3n de duplicidad (\"check duplicate\") determinada, lo que permite a usuarios autenticados remotos averiguar (1) los nombres de clientes a trav\u00e9s una acci\u00f3n ShowDuplicates del m\u00f3dulo Accounts, a la que se puede acceder trav\u00e9s de index.php; o (2) los nombres de personas de contacto a trav\u00e9s de una acci\u00f3n ShowDuplicates del m\u00f3dulo Contacts, a la que se puede acceder trav\u00e9s de index.php."
    }
  ],
  "id": "CVE-2011-0745",
  "lastModified": "2024-11-21T01:24:45.013",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-03-16T22:55:02.980",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/8141"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.redteam-pentesting.de/advisories/rt-sa-2011-002"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/517027/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/46885"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1025222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0675"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/8141"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.redteam-pentesting.de/advisories/rt-sa-2011-002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/517027/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46885"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0675"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66110"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.