VAR-201703-0133

Vulnerability from variot - Updated: 2025-04-20 23:35

Jensen of Scandinavia AS Air:Link 3G (AL3G) , Air:Link 5000AC (AL5000AC) ,and Air:Link 59300 (AL59300) The device contains a stack buffer overflow vulnerability.By a remote attacker, /goform/formWlanMP endpoint Any code can be executed via the following parameters, or Web The service may be crashed. (1) ateFunc Parameters (2) ateGain Parameters (3) ateTxCount Parameters (4) ateChan Parameters (5) ateRate Parameters (6) ateMacID Parameters (7) e2pTxPower1 Parameters (8) e2pTxPower2 Parameters (9) e2pTxPower3 Parameters (10) e2pTxPower4 Parameters (11) e2pTxPower5 Parameters (12) e2pTxPower6 Parameters (13) e2pTxPower7 Parameters (14) e2pTx2Power1 Parameters (15) e2pTx2Power2 Parameters (16) e2pTx2Power3 Parameters (17) e2pTx2Power4 Parameters (18) e2pTx2Power5 Parameters (19) e2pTx2Power6 Parameters (20) e2pTx2Power7 Parameters (21) ateTxFreqOffset Parameters (22) ateMode Parameters (23) ateBW Parameters (24) ateAntenna Parameters (25) e2pTxFreqOffset Parameters (26) e2pTxPwDeltaB Parameters (27) e2pTxPwDeltaG Parameters (28) e2pTxPwDeltaMix Parameters (29) e2pTxPwDeltaN Parameters (30) readE2P Parameters. JensenofScandinaviaASAir: Link3G and others are routers of the Norwegian Jensenof ScandinaviaAS company. Multiple JensenofScandinaviaASAir: Stack Buffer Overflow Vulnerabilities in Link Routers. Jensen of Scandinavia AS Air: Link 3G, etc. are all routers of Jensen of Scandinavia AS in Norway. The following products and versions are affected: Jensen of Scandinavia AS Air: Link 3G (AL3G) 2.23m (Rev. 3); Air: Link 5000AC (AL5000AC) 1.13; Air: Link 59300 (AL59300) 1.04 (Rev. 4) Version

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201703-0133",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "air\\:link 5000ac",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "jensenofscandinavia",
        "version": "1.13"
      },
      {
        "model": "air\\:link 59300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "jensenofscandinavia",
        "version": "1.04"
      },
      {
        "model": "air\\:link 3g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "jensenofscandinavia",
        "version": "2.23m"
      },
      {
        "model": "air:link 3g",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "jensen of scandinavia as",
        "version": "version 2.23m (rev.3)"
      },
      {
        "model": "air:link 5000ac",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "jensen of scandinavia as",
        "version": "version 1.13"
      },
      {
        "model": "air:link 59300",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "jensen of scandinavia as",
        "version": "version 1.04 (rev.4)"
      },
      {
        "model": "of scandinavia air:link 3g 2.23m (rev.",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "jensen",
        "version": "3)"
      },
      {
        "model": "of scandinavia air:link 5000ac",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "jensen",
        "version": "1.13"
      },
      {
        "model": "of scandinavia air:link (rev.",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "jensen",
        "version": "593001.044)"
      },
      {
        "model": "air\\:link 3g",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "jensen of scandinavia as",
        "version": "2.23m"
      },
      {
        "model": "air\\:link 5000ac",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "jensen of scandinavia as",
        "version": "1.13"
      },
      {
        "model": "air\\:link 59300",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "jensen of scandinavia as",
        "version": "1.04"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33210"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008207"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-1102"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-10273"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:jensen_of_scandinavia_as:air%3Alink_3g_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:jensen_of_scandinavia_as:air%3Alink_5000ac_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:jensen_of_scandinavia_as:air%3Alink_59300_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008207"
      }
    ]
  },
  "cve": "CVE-2016-10273",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "CVE-2016-10273",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2017-33210",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "VHN-89033",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2016-10273",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2016-10273",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-10273",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-10273",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-33210",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201703-1102",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-89033",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33210"
      },
      {
        "db": "VULHUB",
        "id": "VHN-89033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008207"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-1102"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-10273"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Jensen of Scandinavia AS Air:Link 3G (AL3G) , Air:Link 5000AC (AL5000AC) ,and Air:Link 59300 (AL59300) The device contains a stack buffer overflow vulnerability.By a remote attacker, /goform/formWlanMP endpoint Any code can be executed via the following parameters, or Web The service may be crashed. (1) ateFunc Parameters (2) ateGain Parameters (3) ateTxCount Parameters (4) ateChan Parameters (5) ateRate Parameters (6) ateMacID Parameters (7) e2pTxPower1 Parameters (8) e2pTxPower2 Parameters (9) e2pTxPower3 Parameters (10) e2pTxPower4 Parameters (11) e2pTxPower5 Parameters (12) e2pTxPower6 Parameters (13) e2pTxPower7 Parameters (14) e2pTx2Power1 Parameters (15) e2pTx2Power2 Parameters (16) e2pTx2Power3 Parameters (17) e2pTx2Power4 Parameters (18) e2pTx2Power5 Parameters (19) e2pTx2Power6 Parameters (20) e2pTx2Power7 Parameters (21) ateTxFreqOffset Parameters (22) ateMode Parameters (23) ateBW Parameters (24) ateAntenna Parameters (25) e2pTxFreqOffset Parameters (26) e2pTxPwDeltaB Parameters (27) e2pTxPwDeltaG Parameters (28) e2pTxPwDeltaMix Parameters (29) e2pTxPwDeltaN Parameters (30) readE2P Parameters. JensenofScandinaviaASAir: Link3G and others are routers of the Norwegian Jensenof ScandinaviaAS company. Multiple JensenofScandinaviaASAir: Stack Buffer Overflow Vulnerabilities in Link Routers. Jensen of Scandinavia AS Air: Link 3G, etc. are all routers of Jensen of Scandinavia AS in Norway. The following products and versions are affected: Jensen of Scandinavia AS Air: Link 3G (AL3G) 2.23m (Rev. 3); Air: Link 5000AC (AL5000AC) 1.13; Air: Link 59300 (AL59300) 1.04 (Rev. 4) Version",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008207"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-33210"
      },
      {
        "db": "VULHUB",
        "id": "VHN-89033"
      }
    ],
    "trust": 1.35
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-10273",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008207",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-1102",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-33210",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-89033",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33210"
      },
      {
        "db": "VULHUB",
        "id": "VHN-89033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008207"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-1102"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-10273"
      }
    ]
  },
  "id": "VAR-201703-0133",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33210"
      },
      {
        "db": "VULHUB",
        "id": "VHN-89033"
      }
    ],
    "trust": 1.7
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33210"
      }
    ]
  },
  "last_update_date": "2025-04-20T23:35:55.939000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.jensenofscandinavia.com/en/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008207"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-89033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008207"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-10273"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://www.riskbasedsecurity.com/research/rbs-2016-004.pdf"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-10273"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-10273"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33210"
      },
      {
        "db": "VULHUB",
        "id": "VHN-89033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008207"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-1102"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-10273"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33210"
      },
      {
        "db": "VULHUB",
        "id": "VHN-89033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008207"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-1102"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-10273"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-33210"
      },
      {
        "date": "2017-03-26T00:00:00",
        "db": "VULHUB",
        "id": "VHN-89033"
      },
      {
        "date": "2017-05-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-008207"
      },
      {
        "date": "2017-03-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201703-1102"
      },
      {
        "date": "2017-03-26T05:59:00.163000",
        "db": "NVD",
        "id": "CVE-2016-10273"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-33210"
      },
      {
        "date": "2017-04-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-89033"
      },
      {
        "date": "2017-05-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-008207"
      },
      {
        "date": "2021-09-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201703-1102"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2016-10273"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-1102"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Jensen of Scandinavia AS Air:Link Device stack buffer overflow vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008207"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-1102"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…