CVE-2021-47388 (GCVE-0-2021-47388)
Vulnerability from cvelistv5
Published
2024-05-21 15:03
Modified
2025-05-04 12:41
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: mac80211: fix use-after-free in CCMP/GCMP RX When PN checking is done in mac80211, for fragmentation we need to copy the PN to the RX struct so we can later use it to do a comparison, since commit bf30ca922a0c ("mac80211: check defrag PN against current frame"). Unfortunately, in that commit I used the 'hdr' variable without it being necessarily valid, so use-after-free could occur if it was necessary to reallocate (parts of) the frame. Fix this by reloading the variable after the code that results in the reallocations, if any. This fixes https://bugzilla.kernel.org/show_bug.cgi?id=214401.
Impacted products
Vendor Product Version
Linux Linux Version: 608b0a2ae928a74a2f89e02227339dd79cdb63cf
Version: d0f613fe6de344dc17ba04a88921a2094c13d3fa
Version: a9b57952fed41556c950a92123086724eaf11919
Version: 0f716b48ed25503e6961f4b5b40ece36f7e4ed26
Version: c8b3a6150dc8ac78d5fdd5fbdfc4806249ef8b2c
Version: e64ea0597050157f926ac2ba9b478a44ee5be945
Version: bf30ca922a0c0176007e074b0acc77ed345e9990
Version: bf30ca922a0c0176007e074b0acc77ed345e9990
Version: 1f0bf30c01d3f4de7d6c5e27b102a808c5646676
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:39:58.947Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/447d001b875d0e7f211c4ba004916028da994258"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/31de381aef0ab1b342f62485118dc8a19363dc78"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/3d5d629c99c468458022e9b381789de3595bf4dd"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/50149e0866a82cef33e680ee68dc380a5bc75d32"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/57de2dcb18742dc2860861c9f496da7d42b67da0"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/94513069eb549737bcfc3d988d6ed4da948a2de8"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-47388",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T15:38:19.729589Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:33:43.903Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/mac80211/wpa.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "447d001b875d0e7f211c4ba004916028da994258",
              "status": "affected",
              "version": "608b0a2ae928a74a2f89e02227339dd79cdb63cf",
              "versionType": "git"
            },
            {
              "lessThan": "31de381aef0ab1b342f62485118dc8a19363dc78",
              "status": "affected",
              "version": "d0f613fe6de344dc17ba04a88921a2094c13d3fa",
              "versionType": "git"
            },
            {
              "lessThan": "f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb",
              "status": "affected",
              "version": "a9b57952fed41556c950a92123086724eaf11919",
              "versionType": "git"
            },
            {
              "lessThan": "3d5d629c99c468458022e9b381789de3595bf4dd",
              "status": "affected",
              "version": "0f716b48ed25503e6961f4b5b40ece36f7e4ed26",
              "versionType": "git"
            },
            {
              "lessThan": "50149e0866a82cef33e680ee68dc380a5bc75d32",
              "status": "affected",
              "version": "c8b3a6150dc8ac78d5fdd5fbdfc4806249ef8b2c",
              "versionType": "git"
            },
            {
              "lessThan": "57de2dcb18742dc2860861c9f496da7d42b67da0",
              "status": "affected",
              "version": "e64ea0597050157f926ac2ba9b478a44ee5be945",
              "versionType": "git"
            },
            {
              "lessThan": "27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9",
              "status": "affected",
              "version": "bf30ca922a0c0176007e074b0acc77ed345e9990",
              "versionType": "git"
            },
            {
              "lessThan": "94513069eb549737bcfc3d988d6ed4da948a2de8",
              "status": "affected",
              "version": "bf30ca922a0c0176007e074b0acc77ed345e9990",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "1f0bf30c01d3f4de7d6c5e27b102a808c5646676",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/mac80211/wpa.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.13"
            },
            {
              "lessThan": "5.13",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.4.*",
              "status": "unaffected",
              "version": "4.4.286",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.*",
              "status": "unaffected",
              "version": "4.9.285",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.249",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.209",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.151",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.71",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.14.*",
              "status": "unaffected",
              "version": "5.14.10",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.15",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.4.286",
                  "versionStartIncluding": "4.4.271",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.9.285",
                  "versionStartIncluding": "4.9.271",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.249",
                  "versionStartIncluding": "4.14.235",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.209",
                  "versionStartIncluding": "4.19.193",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.151",
                  "versionStartIncluding": "5.4.124",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.71",
                  "versionStartIncluding": "5.10.42",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.14.10",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.12.9",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: fix use-after-free in CCMP/GCMP RX\n\nWhen PN checking is done in mac80211, for fragmentation we need\nto copy the PN to the RX struct so we can later use it to do a\ncomparison, since commit bf30ca922a0c (\"mac80211: check defrag\nPN against current frame\").\n\nUnfortunately, in that commit I used the \u0027hdr\u0027 variable without\nit being necessarily valid, so use-after-free could occur if it\nwas necessary to reallocate (parts of) the frame.\n\nFix this by reloading the variable after the code that results\nin the reallocations, if any.\n\nThis fixes https://bugzilla.kernel.org/show_bug.cgi?id=214401."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T12:41:27.303Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/447d001b875d0e7f211c4ba004916028da994258"
        },
        {
          "url": "https://git.kernel.org/stable/c/31de381aef0ab1b342f62485118dc8a19363dc78"
        },
        {
          "url": "https://git.kernel.org/stable/c/f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb"
        },
        {
          "url": "https://git.kernel.org/stable/c/3d5d629c99c468458022e9b381789de3595bf4dd"
        },
        {
          "url": "https://git.kernel.org/stable/c/50149e0866a82cef33e680ee68dc380a5bc75d32"
        },
        {
          "url": "https://git.kernel.org/stable/c/57de2dcb18742dc2860861c9f496da7d42b67da0"
        },
        {
          "url": "https://git.kernel.org/stable/c/27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9"
        },
        {
          "url": "https://git.kernel.org/stable/c/94513069eb549737bcfc3d988d6ed4da948a2de8"
        }
      ],
      "title": "mac80211: fix use-after-free in CCMP/GCMP RX",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-47388",
    "datePublished": "2024-05-21T15:03:47.574Z",
    "dateReserved": "2024-05-21T14:58:30.813Z",
    "dateUpdated": "2025-05-04T12:41:27.303Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/447d001b875d0e7f211c4ba004916028da994258\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/31de381aef0ab1b342f62485118dc8a19363dc78\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/3d5d629c99c468458022e9b381789de3595bf4dd\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/50149e0866a82cef33e680ee68dc380a5bc75d32\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/57de2dcb18742dc2860861c9f496da7d42b67da0\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/94513069eb549737bcfc3d988d6ed4da948a2de8\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:39:58.947Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47388\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:38:19.729589Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:18.385Z\"}}], \"cna\": {\"title\": \"mac80211: fix use-after-free in CCMP/GCMP RX\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"608b0a2ae928a74a2f89e02227339dd79cdb63cf\", \"lessThan\": \"447d001b875d0e7f211c4ba004916028da994258\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d0f613fe6de344dc17ba04a88921a2094c13d3fa\", \"lessThan\": \"31de381aef0ab1b342f62485118dc8a19363dc78\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a9b57952fed41556c950a92123086724eaf11919\", \"lessThan\": \"f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0f716b48ed25503e6961f4b5b40ece36f7e4ed26\", \"lessThan\": \"3d5d629c99c468458022e9b381789de3595bf4dd\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c8b3a6150dc8ac78d5fdd5fbdfc4806249ef8b2c\", \"lessThan\": \"50149e0866a82cef33e680ee68dc380a5bc75d32\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e64ea0597050157f926ac2ba9b478a44ee5be945\", \"lessThan\": \"57de2dcb18742dc2860861c9f496da7d42b67da0\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bf30ca922a0c0176007e074b0acc77ed345e9990\", \"lessThan\": \"27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bf30ca922a0c0176007e074b0acc77ed345e9990\", \"lessThan\": \"94513069eb549737bcfc3d988d6ed4da948a2de8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1f0bf30c01d3f4de7d6c5e27b102a808c5646676\", \"versionType\": \"git\"}], \"programFiles\": [\"net/mac80211/wpa.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.13\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.13\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.4.286\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.4.*\"}, {\"status\": \"unaffected\", \"version\": \"4.9.285\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.9.*\"}, {\"status\": \"unaffected\", \"version\": \"4.14.249\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.209\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.151\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.71\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.14.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.14.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"net/mac80211/wpa.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/447d001b875d0e7f211c4ba004916028da994258\"}, {\"url\": \"https://git.kernel.org/stable/c/31de381aef0ab1b342f62485118dc8a19363dc78\"}, {\"url\": \"https://git.kernel.org/stable/c/f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb\"}, {\"url\": \"https://git.kernel.org/stable/c/3d5d629c99c468458022e9b381789de3595bf4dd\"}, {\"url\": \"https://git.kernel.org/stable/c/50149e0866a82cef33e680ee68dc380a5bc75d32\"}, {\"url\": \"https://git.kernel.org/stable/c/57de2dcb18742dc2860861c9f496da7d42b67da0\"}, {\"url\": \"https://git.kernel.org/stable/c/27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9\"}, {\"url\": \"https://git.kernel.org/stable/c/94513069eb549737bcfc3d988d6ed4da948a2de8\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmac80211: fix use-after-free in CCMP/GCMP RX\\n\\nWhen PN checking is done in mac80211, for fragmentation we need\\nto copy the PN to the RX struct so we can later use it to do a\\ncomparison, since commit bf30ca922a0c (\\\"mac80211: check defrag\\nPN against current frame\\\").\\n\\nUnfortunately, in that commit I used the \u0027hdr\u0027 variable without\\nit being necessarily valid, so use-after-free could occur if it\\nwas necessary to reallocate (parts of) the frame.\\n\\nFix this by reloading the variable after the code that results\\nin the reallocations, if any.\\n\\nThis fixes https://bugzilla.kernel.org/show_bug.cgi?id=214401.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.4.286\", \"versionStartIncluding\": \"4.4.271\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.9.285\", \"versionStartIncluding\": \"4.9.271\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.14.249\", \"versionStartIncluding\": \"4.14.235\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.209\", \"versionStartIncluding\": \"4.19.193\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.151\", \"versionStartIncluding\": \"5.4.124\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.71\", \"versionStartIncluding\": \"5.10.42\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.14.10\", \"versionStartIncluding\": \"5.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15\", \"versionStartIncluding\": \"5.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"5.12.9\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T12:41:27.303Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-47388\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T12:41:27.303Z\", \"dateReserved\": \"2024-05-21T14:58:30.813Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-05-21T15:03:47.574Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…