var-202109-1066
Vulnerability from variot
Certain NETGEAR smart switches are affected by a remote admin password change by an unauthenticated attacker via the (disabled by default) /sqfs/bin/sccd daemon, which fails to check authentication when the authentication TLV is missing from a received NSDP packet. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2. plural NETGEAR Smart Switch contains an authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. GC108P and other American Netgear (Netgear) company's intelligent switch products. This affects GC108P prior to 1.0.8.2, GC108PP prior to 1.0.8.2, GS108Tv3 prior to 7.0.7.2, GS110TPP prior to 7.0.7.2, GS110TPv3 prior to 7.0.7.2, GS110TUP prior to 1.0.5.3, GS308T prior to 1.0.3.2, GS310TP prior to 1.0.3.2, GS710TUP prior to 1.0.5.3, GS716TP prior to 1.0.4.2, GS716TPP prior to 1.0.4.2, GS724TPP prior to 2.0.6.3, GS724TPv2 prior to 2.0.6.3, GS728TPPv2 prior to 6.0.8.2, GS728TPv2 prior to 6.0.8.2, GS750E prior to 1.0.1.10, GS752TPP prior to 6.0.8.2, GS752TPv2 prior to 6.0.8.2, MS510TXM prior to 1.0.4.2, and MS510TXUP prior to 1.0.4.2
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1066", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gc108p", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.8.2" }, { "model": "gc108pp", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.8.2" }, { "model": "gs110tpp", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "7.0.7.2" }, { "model": "gs110tup", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.5.3" }, { "model": "gs308t", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.3.2" }, { "model": "gs310tp", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.3.2" }, { "model": "gs710tup", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.5.3" }, { "model": "gs716tp", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.4.2" }, { "model": "gs716tpp", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.4.2" }, { "model": "gs724tpp", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.0.6.3" }, { "model": "gs752tpp", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "6.0.8.2" }, { "model": "ms510txm", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.4.2" }, { "model": "ms510txup", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.4.2" }, { "model": "gs110tp", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "7.0.7.2" }, { "model": "gs108t", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "7.0.7.2" }, { "model": "gs750e", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "1.0.1.10" }, { "model": "gs728tp", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "6.0.8.2" }, { "model": "gs724tp", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.0.6.3" }, { "model": "gs752tp", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "6.0.8.2" }, { "model": "gs728tpp", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "6.0.8.2" }, { "model": "gs110tup", "scope": null, "trust": 0.8, "vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2", "version": null }, { "model": "gs108t", "scope": null, "trust": 0.8, "vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2", "version": null }, { "model": "gs310tp", "scope": null, "trust": 0.8, "vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2", "version": null }, { "model": "gs710tup", "scope": null, "trust": 0.8, "vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2", "version": null }, { "model": "gs110tpp", "scope": null, "trust": 0.8, "vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2", "version": null }, { "model": "gs308t", "scope": null, "trust": 0.8, "vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2", "version": null }, { "model": "gc108p", "scope": null, "trust": 0.8, "vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2", "version": null }, { "model": "gs716tp", "scope": null, "trust": 0.8, "vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2", "version": null }, { "model": "gs110tp", "scope": null, "trust": 0.8, "vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2", "version": null }, { "model": "gc108pp", "scope": null, "trust": 0.8, "vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2", "version": null }, { "model": "gs108tv3", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "7.0.7.2" }, { "model": "gs110tpv3", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "7.0.7.2" }, { "model": "gs724tpv2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "2.0.6.3" }, { "model": "gs728tppv2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "6.0.8.2" }, { "model": "gs728tpv2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "6.0.8.2" }, { "model": "gs750e", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "1.0.1.10" }, { "model": "gs752tpv2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "6.0.8.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-83561" }, { "db": "JVNDB", "id": "JVNDB-2021-011955" }, { "db": "NVD", "id": "CVE-2021-40866" } ] }, "cve": "CVE-2021-40866", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 5.5, "id": "CVE-2021-40866", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 5.5, "id": "CNVD-2021-83561", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-40866", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "cve@mitre.org", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40866", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40866", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40866", "trust": 1.0, "value": "HIGH" }, { "author": "cve@mitre.org", "id": "CVE-2021-40866", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-40866", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-83561", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202109-729", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-40866", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-83561" }, { "db": "VULMON", "id": "CVE-2021-40866" }, { "db": "JVNDB", "id": "JVNDB-2021-011955" }, { "db": "CNNVD", "id": "CNNVD-202109-729" }, { "db": "NVD", "id": "CVE-2021-40866" }, { "db": "NVD", "id": "CVE-2021-40866" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR smart switches are affected by a remote admin password change by an unauthenticated attacker via the (disabled by default) /sqfs/bin/sccd daemon, which fails to check authentication when the authentication TLV is missing from a received NSDP packet. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2. plural NETGEAR Smart Switch contains an authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. GC108P and other American Netgear (Netgear) company\u0027s intelligent switch products. This affects GC108P prior to 1.0.8.2, GC108PP prior to 1.0.8.2, GS108Tv3 prior to 7.0.7.2, GS110TPP prior to 7.0.7.2, GS110TPv3 prior to 7.0.7.2, GS110TUP prior to 1.0.5.3, GS308T prior to 1.0.3.2, GS310TP prior to 1.0.3.2, GS710TUP prior to 1.0.5.3, GS716TP prior to 1.0.4.2, GS716TPP prior to 1.0.4.2, GS724TPP prior to 2.0.6.3, GS724TPv2 prior to 2.0.6.3, GS728TPPv2 prior to 6.0.8.2, GS728TPv2 prior to 6.0.8.2, GS750E prior to 1.0.1.10, GS752TPP prior to 6.0.8.2, GS752TPv2 prior to 6.0.8.2, MS510TXM prior to 1.0.4.2, and MS510TXUP prior to 1.0.4.2", "sources": [ { "db": "NVD", "id": "CVE-2021-40866" }, { "db": "JVNDB", "id": "JVNDB-2021-011955" }, { "db": "CNVD", "id": "CNVD-2021-83561" }, { "db": "VULMON", "id": "CVE-2021-40866" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40866", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-011955", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-83561", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202109-729", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-40866", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-83561" }, { "db": "VULMON", "id": "CVE-2021-40866" }, { "db": "JVNDB", "id": "JVNDB-2021-011955" }, { "db": "CNNVD", "id": "CNNVD-202109-729" }, { "db": "NVD", "id": "CVE-2021-40866" } ] }, "id": "VAR-202109-1066", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-83561" } ], "trust": 1.1590209961904763 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-83561" } ] }, "last_update_date": "2024-11-23T22:20:45.076000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security\u00a0Advisory\u00a0for\u00a0Multiple\u00a0Vulnerabilities\u00a0on\u00a0Some\u00a0Smart\u00a0Switches,\u00a0PSV-2021-0140,\u00a0PSV-2021-0144,\u00a0PSV-2021-0145", "trust": 0.8, "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" }, { "title": "Patch for Multiple NETGEAR smart switches have input verification error vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/296416" }, { "title": "Netgear NETGEAR Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=163755" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-83561" }, { "db": "JVNDB", "id": "JVNDB-2021-011955" }, { "db": "CNNVD", "id": "CNNVD-202109-729" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-011955" }, { "db": "NVD", "id": "CVE-2021-40866" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40866" }, { "trust": 1.7, "url": "https://kb.netgear.com/000063978/security-advisory-for-multiple-vulnerabilities-on-some-smart-switches-psv-2021-0140-psv-2021-0144-psv-2021-0145" }, { "trust": 1.7, "url": "https://gynvael.coldwind.pl/?id=740" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-83561" }, { "db": "VULMON", "id": "CVE-2021-40866" }, { "db": "JVNDB", "id": "JVNDB-2021-011955" }, { "db": "CNNVD", "id": "CNNVD-202109-729" }, { "db": "NVD", "id": "CVE-2021-40866" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-83561" }, { "db": "VULMON", "id": "CVE-2021-40866" }, { "db": "JVNDB", "id": "JVNDB-2021-011955" }, { "db": "CNNVD", "id": "CNNVD-202109-729" }, { "db": "NVD", "id": "CVE-2021-40866" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-09-12T00:00:00", "db": "CNVD", "id": "CNVD-2021-83561" }, { "date": "2021-09-13T00:00:00", "db": "VULMON", "id": "CVE-2021-40866" }, { "date": "2022-08-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-011955" }, { "date": "2021-09-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-729" }, { "date": "2021-09-13T08:15:08.037000", "db": "NVD", "id": "CVE-2021-40866" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-04T00:00:00", "db": "CNVD", "id": "CNVD-2021-83561" }, { "date": "2021-09-24T00:00:00", "db": "VULMON", "id": "CVE-2021-40866" }, { "date": "2022-08-18T08:35:00", "db": "JVNDB", "id": "JVNDB-2021-011955" }, { "date": "2021-09-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-729" }, { "date": "2024-11-21T06:24:58.243000", "db": "NVD", "id": "CVE-2021-40866" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-729" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0NETGEAR\u00a0 Authentication Vulnerability in Smart Switch", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-011955" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-729" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.