fkie_cve-2023-41706
Vulnerability from fkie_nvd
Published
2024-02-12 09:15
Modified
2024-11-21 08:21
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Processing time of drive search expressions now gets monitored, and the related request is terminated if a resource threshold is reached. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing of user-defined drive search expressions is not limited No publicly available exploits are known.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*", matchCriteriaId: "7804FF21-94F6-4160-9628-B91ED4CDDCB6", versionEndExcluding: "7.6.3", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*", matchCriteriaId: "3159C504-0462-4AA9-9137-F25961B67ED6", versionEndExcluding: "7.10.6", versionStartExcluding: "7.6.3", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*", matchCriteriaId: "F37B7CC3-A4D2-4CA5-8159-FE1A9016F9A0", versionEndExcluding: "8.20", versionStartExcluding: "7.10.6", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:-:*:*:*:*:*:*", matchCriteriaId: "7AB04398-3973-4503-959E-FA8EE511DA45", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3464:*:*:*:*:*:*", matchCriteriaId: "161CD641-C9EC-4FBE-BFFD-48C96FE71085", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3519:*:*:*:*:*:*", matchCriteriaId: "73F1F959-F82B-4E00-91AE-C39037A93DDF", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3569:*:*:*:*:*:*", matchCriteriaId: "E151E1EA-DA35-47CB-80C2-359518C213FD", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3627:*:*:*:*:*:*", matchCriteriaId: "156910B8-F553-4F4C-B990-131F04001AB2", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3728:*:*:*:*:*:*", matchCriteriaId: "13248A9A-D131-4596-A511-A18A83F9D4C2", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3875:*:*:*:*:*:*", matchCriteriaId: "54936294-45A6-410B-B6F6-CC2CEFCE937E", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3922:*:*:*:*:*:*", matchCriteriaId: "8EDB7577-5763-41A1-90A7-7D7F225F8C14", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3949:*:*:*:*:*:*", matchCriteriaId: "39B4BD56-3236-4AE0-93F6-F0E0190C77AD", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3991:*:*:*:*:*:*", matchCriteriaId: "6F20C5D9-6DCA-4F3F-A9A8-FACAE5C4AB18", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4047:*:*:*:*:*:*", matchCriteriaId: "F94B78AE-45FE-4BA7-BFD6-55767F8C3A0E", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4133:*:*:*:*:*:*", matchCriteriaId: "B103D02E-C443-446B-A358-A052866BC624", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4423:*:*:*:*:*:*", matchCriteriaId: "4D578FCB-EE90-4BB9-9E28-DC1FA139787C", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4470:*:*:*:*:*:*", matchCriteriaId: "71380C28-6A25-425B-BE7F-6D06E0CE5C2F", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4552:*:*:*:*:*:*", matchCriteriaId: "DDBF0D2F-2C22-448E-A0D2-E66527188928", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4667:*:*:*:*:*:*", matchCriteriaId: "50EC169C-73B6-40F5-8C7A-6DD71DC19893", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4750:*:*:*:*:*:*", matchCriteriaId: "4B2CA948-280B-4EB8-9309-B016C9557A64", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4789:*:*:*:*:*:*", matchCriteriaId: "36511A48-EBD8-40C2-A1FB-10F33264CF3F", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4839:*:*:*:*:*:*", matchCriteriaId: "EBE8374F-0D7D-422F-83AC-ADF9B9E6E511", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4860:*:*:*:*:*:*", matchCriteriaId: "285B9A4B-6F4F-4899-AD2A-57E22BF9F7BF", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4895:*:*:*:*:*:*", matchCriteriaId: "5BAD0604-90FC-4647-854A-E10330579B89", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5104:*:*:*:*:*:*", matchCriteriaId: "7F26505E-0F61-40A2-B6BA-17C7E30D375C", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5165:*:*:*:*:*:*", matchCriteriaId: "FD3E0ABC-2DAC-4441-96DB-BD84DD8B8E81", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5231:*:*:*:*:*:*", matchCriteriaId: "347700F5-3BDA-4DA3-AA81-4D593E131AB9", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5537:*:*:*:*:*:*", matchCriteriaId: "5EF075DE-44C7-4FC0-9BD7-E7A2C95651D8", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5637:*:*:*:*:*:*", matchCriteriaId: "5CB6B4D0-E2B8-44F3-877B-293325EF44A3", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5910:*:*:*:*:*:*", matchCriteriaId: "716CC742-9F23-4734-9CFF-338A231476D4", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:-:*:*:*:*:*:*", matchCriteriaId: "A144D75D-60A8-4EE0-813C-F658C626B2AA", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6069:*:*:*:*:*:*", matchCriteriaId: "2DA66230-DE02-4881-A893-E9E78286B157", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6073:*:*:*:*:*:*", matchCriteriaId: "955F3DFB-6479-4867-B62A-82730DBEB498", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6080:*:*:*:*:*:*", matchCriteriaId: "327D1B56-0D05-4D99-91D4-CC1F0AC32972", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6085:*:*:*:*:*:*", matchCriteriaId: "D0CD0684-C431-47F8-A2F4-1936D5C5A72B", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6093:*:*:*:*:*:*", matchCriteriaId: "EAA6A4A7-C1EE-4716-9F4D-2FF4C4D5FEC8", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6102:*:*:*:*:*:*", matchCriteriaId: "D0968764-CCEE-47A7-9111-E106D887DA43", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6112:*:*:*:*:*:*", matchCriteriaId: "16589FBB-F0CD-4041-8141-5C89FCCA72AF", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6121:*:*:*:*:*:*", matchCriteriaId: "3CB877EE-A5FE-4FF7-9D21-5C1CFA7343D4", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6133:*:*:*:*:*:*", matchCriteriaId: "0DF5FB90-8D6D-4F99-B454-411B1DFFA630", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6138:*:*:*:*:*:*", matchCriteriaId: "F58876B9-6C2E-4048-A793-B441A84E86F5", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6141:*:*:*:*:*:*", matchCriteriaId: "D5F177CB-CC45-45A0-9D02-C14A13ECC7A3", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6146:*:*:*:*:*:*", matchCriteriaId: "A89A4192-54E9-4899-8C7B-6C7F7E650D5C", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6147:*:*:*:*:*:*", matchCriteriaId: "F2DC1357-9CD5-415F-A190-2F3F4498EF96", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6148:*:*:*:*:*:*", matchCriteriaId: "D78ACF64-2802-44DD-AF7A-1BD5EA7F9908", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6150:*:*:*:*:*:*", matchCriteriaId: "E8F675FA-1684-413A-B1BE-1C5434AC2862", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6156:*:*:*:*:*:*", matchCriteriaId: "F3F1FDC3-35B2-4BDB-A685-75BC72588179", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6161:*:*:*:*:*:*", matchCriteriaId: "5B1E509D-2F41-4296-86D2-6BD71783060F", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6166:*:*:*:*:*:*", matchCriteriaId: "AC93EA37-F341-45EC-B651-4F326FB8C613", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6173:*:*:*:*:*:*", matchCriteriaId: "1A4DB8A6-1702-462C-BFCB-39F91D2EFCE1", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6176:*:*:*:*:*:*", matchCriteriaId: "FC0AEFDB-D033-47FC-93FC-8652F922BB8C", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6178:*:*:*:*:*:*", matchCriteriaId: "B5354768-6527-43C2-B492-A8C14AB4E784", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6189:*:*:*:*:*:*", matchCriteriaId: "D83F26D1-B8C6-4114-81EC-810DD5412DC8", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6194:*:*:*:*:*:*", matchCriteriaId: "E9EBC010-9963-4636-96F7-A121FCF755A7", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6199:*:*:*:*:*:*", matchCriteriaId: "F626D64B-C301-4CD8-94B4-48689BD3F29C", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6204:*:*:*:*:*:*", matchCriteriaId: "5E32810C-7B35-42F1-BCA5-E10C02BE2215", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6205:*:*:*:*:*:*", matchCriteriaId: "6539D059-8614-4C26-93C4-C2DDCC5D35E2", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6209:*:*:*:*:*:*", matchCriteriaId: "E359EE75-A2F9-479B-B757-CAE1064AB8F4", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6210:*:*:*:*:*:*", matchCriteriaId: "0BCABDEF-D292-406E-B53C-AFF22484E916", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6214:*:*:*:*:*:*", matchCriteriaId: "ABE8872C-B1DD-4A45-8EF8-E8C355CA6C54", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6215:*:*:*:*:*:*", matchCriteriaId: "44B20B83-833A-4C68-8693-365BD046C157", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6216:*:*:*:*:*:*", matchCriteriaId: "E254E6D1-D18E-4A2A-A2FF-7D03F39E65DD", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6218:*:*:*:*:*:*", matchCriteriaId: "5F0C5E53-4D15-425A-B4CF-5869353724BF", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6219:*:*:*:*:*:*", matchCriteriaId: "2F4BF5F1-F316-4BAC-83E0-DEAC8C50754E", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6220:*:*:*:*:*:*", matchCriteriaId: "5CDD03A8-5B86-4B87-9C29-6C967261C5C0", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6227:*:*:*:*:*:*", matchCriteriaId: "6071E15F-4D59-41DC-A4D4-7D1AA392A1F2", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6230:*:*:*:*:*:*", matchCriteriaId: "C72C1CEB-7BF7-4A5F-B2E9-397F86CCBF4E", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6233:*:*:*:*:*:*", matchCriteriaId: "5B0F0218-4224-4084-B38D-9719D3782C03", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6235:*:*:*:*:*:*", matchCriteriaId: "BFC41329-1AD6-4575-A22D-977EC5539DA4", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6236:*:*:*:*:*:*", matchCriteriaId: "217A06B7-0823-4508-BC0C-AD792BA88F7B", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6239:*:*:*:*:*:*", matchCriteriaId: "246E98B2-A6C8-4410-AA6A-7E81EE8C5E76", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6241:*:*:*:*:*:*", matchCriteriaId: "74D1EC02-D009-45DA-B1EC-2219E0F0183C", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6243:*:*:*:*:*:*", matchCriteriaId: "0F56A261-EC62-423C-B487-35EA9D4A83FB", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6245:*:*:*:*:*:*", matchCriteriaId: "D295E160-C87A-498D-AB0E-BA1E50825249", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6248:*:*:*:*:*:*", matchCriteriaId: "A30BE138-D745-4F0E-AAE4-202A1C769C85", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6249:*:*:*:*:*:*", matchCriteriaId: "7CF4FCB9-7360-4ABB-95FB-0239CDC8D3AD", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6250:*:*:*:*:*:*", matchCriteriaId: "465DD666-3499-4911-A1DF-6BAAFCCFA006", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6251:*:*:*:*:*:*", matchCriteriaId: "6F18CEDC-5D7A-4496-8B5E-59EBEA4362BD", vulnerable: true, }, { criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6255:*:*:*:*:*:*", matchCriteriaId: "8C1DE547-F217-4518-AD90-3607AE21F6ED", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Processing time of drive search expressions now gets monitored, and the related request is terminated if a resource threshold is reached. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing of user-defined drive search expressions is not limited No publicly available exploits are known.", }, { lang: "es", value: "Ahora se supervisa el tiempo de procesamiento de las expresiones de búsqueda de unidades y la solicitud relacionada finaliza si se alcanza un umbral de recursos. La disponibilidad de OX App Suite podría verse reducida debido a la alta carga de procesamiento. Implemente las actualizaciones y lanzamientos de parches proporcionados. El procesamiento de expresiones de búsqueda de unidades definidas por el usuario no está limitado. No se conocen exploits disponibles públicamente.", }, ], id: "CVE-2023-41706", lastModified: "2024-11-21T08:21:30.800", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "security@open-xchange.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-02-12T09:15:11.073", references: [ { source: "security@open-xchange.com", tags: [ "Vendor Advisory", ], url: "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0007.json", }, { source: "security@open-xchange.com", tags: [ "Release Notes", ], url: "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6259_7.10.6_2023-12-11.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0007.json", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6259_7.10.6_2023-12-11.pdf", }, ], sourceIdentifier: "security@open-xchange.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "security@open-xchange.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.