CVE-2024-44960 (GCVE-0-2024-44960)
Vulnerability from cvelistv5
Published
2024-09-04 18:35
Modified
2025-11-03 22:14
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: core: Check for unset descriptor Make sure the descriptor has been set before looking at maxpacket. This fixes a null pointer panic in this case. This may happen if the gadget doesn't properly set up the endpoint for the current speed, or the gadget descriptors are malformed and the descriptor for the speed/endpoint are not found. No current gadget driver is known to have this problem, but this may cause a hard-to-find bug during development of new gadgets.
Impacted products
Vendor Product Version
Linux Linux Version: d1c188d330ca33cc35d1590441ba276f31144299
Version: 54f83b8c8ea9b22082a496deadf90447a326954e
Version: 54f83b8c8ea9b22082a496deadf90447a326954e
Version: 54f83b8c8ea9b22082a496deadf90447a326954e
Version: 54f83b8c8ea9b22082a496deadf90447a326954e
Version: 54f83b8c8ea9b22082a496deadf90447a326954e
Version: 54f83b8c8ea9b22082a496deadf90447a326954e
Version: 54f83b8c8ea9b22082a496deadf90447a326954e
Version: d7e3f2fe01372eb914d0e451f0e7a46cbcb98f9e
Version: 85c9ece11264499890d0e9f0dee431ac1bda981c
Version: fc71e39a6c07440e6968227f3db1988f45d7a7b7
Version: 94f5de2eefae22c449e367c2dacafe869af73e3f
Version: 8212b44b7109bd30dbf7eb7f5ecbbc413757a7d7
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-44960",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T17:39:50.689815Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-12T17:33:35.969Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T22:14:09.135Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/gadget/udc/core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "ba15815dd24cc5ec0d23e2170dc58c7db1e03b4a",
              "status": "affected",
              "version": "d1c188d330ca33cc35d1590441ba276f31144299",
              "versionType": "git"
            },
            {
              "lessThan": "df8e734ae5e605348aa0ca2498aedb73e815f244",
              "status": "affected",
              "version": "54f83b8c8ea9b22082a496deadf90447a326954e",
              "versionType": "git"
            },
            {
              "lessThan": "7cc9ebcfe58be22f18056ad8bc6272d120bdcb3e",
              "status": "affected",
              "version": "54f83b8c8ea9b22082a496deadf90447a326954e",
              "versionType": "git"
            },
            {
              "lessThan": "50c5248b0ea8aae0529fdf28dac42a41312d3b62",
              "status": "affected",
              "version": "54f83b8c8ea9b22082a496deadf90447a326954e",
              "versionType": "git"
            },
            {
              "lessThan": "a0362cd6e503278add954123957fd47990e8d9bf",
              "status": "affected",
              "version": "54f83b8c8ea9b22082a496deadf90447a326954e",
              "versionType": "git"
            },
            {
              "lessThan": "1a9df57d57452b104c46c918569143cf21d7ebf1",
              "status": "affected",
              "version": "54f83b8c8ea9b22082a496deadf90447a326954e",
              "versionType": "git"
            },
            {
              "lessThan": "716cba46f73a92645cf13eded8d257ed48afc2a4",
              "status": "affected",
              "version": "54f83b8c8ea9b22082a496deadf90447a326954e",
              "versionType": "git"
            },
            {
              "lessThan": "973a57891608a98e894db2887f278777f564de18",
              "status": "affected",
              "version": "54f83b8c8ea9b22082a496deadf90447a326954e",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "d7e3f2fe01372eb914d0e451f0e7a46cbcb98f9e",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "85c9ece11264499890d0e9f0dee431ac1bda981c",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "fc71e39a6c07440e6968227f3db1988f45d7a7b7",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "94f5de2eefae22c449e367c2dacafe869af73e3f",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "8212b44b7109bd30dbf7eb7f5ecbbc413757a7d7",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/gadget/udc/core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.4"
            },
            {
              "lessThan": "5.4",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.320",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.282",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.224",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.165",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.105",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.46",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.11",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.320",
                  "versionStartIncluding": "4.19.82",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.282",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.224",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.165",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.105",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.46",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.10.5",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.11",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.16.80",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.4.199",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.9.199",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.14.152",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.3.9",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: core: Check for unset descriptor\n\nMake sure the descriptor has been set before looking at maxpacket.\nThis fixes a null pointer panic in this case.\n\nThis may happen if the gadget doesn\u0027t properly set up the endpoint\nfor the current speed, or the gadget descriptors are malformed and\nthe descriptor for the speed/endpoint are not found.\n\nNo current gadget driver is known to have this problem, but this\nmay cause a hard-to-find bug during development of new gadgets."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T12:58:29.741Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/ba15815dd24cc5ec0d23e2170dc58c7db1e03b4a"
        },
        {
          "url": "https://git.kernel.org/stable/c/df8e734ae5e605348aa0ca2498aedb73e815f244"
        },
        {
          "url": "https://git.kernel.org/stable/c/7cc9ebcfe58be22f18056ad8bc6272d120bdcb3e"
        },
        {
          "url": "https://git.kernel.org/stable/c/50c5248b0ea8aae0529fdf28dac42a41312d3b62"
        },
        {
          "url": "https://git.kernel.org/stable/c/a0362cd6e503278add954123957fd47990e8d9bf"
        },
        {
          "url": "https://git.kernel.org/stable/c/1a9df57d57452b104c46c918569143cf21d7ebf1"
        },
        {
          "url": "https://git.kernel.org/stable/c/716cba46f73a92645cf13eded8d257ed48afc2a4"
        },
        {
          "url": "https://git.kernel.org/stable/c/973a57891608a98e894db2887f278777f564de18"
        }
      ],
      "title": "usb: gadget: core: Check for unset descriptor",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-44960",
    "datePublished": "2024-09-04T18:35:58.469Z",
    "dateReserved": "2024-08-21T05:34:56.666Z",
    "dateUpdated": "2025-11-03T22:14:09.135Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T22:14:09.135Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-44960\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T17:39:50.689815Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:27.583Z\"}}], \"cna\": {\"title\": \"usb: gadget: core: Check for unset descriptor\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"d1c188d330ca33cc35d1590441ba276f31144299\", \"lessThan\": \"ba15815dd24cc5ec0d23e2170dc58c7db1e03b4a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"54f83b8c8ea9b22082a496deadf90447a326954e\", \"lessThan\": \"df8e734ae5e605348aa0ca2498aedb73e815f244\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"54f83b8c8ea9b22082a496deadf90447a326954e\", \"lessThan\": \"7cc9ebcfe58be22f18056ad8bc6272d120bdcb3e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"54f83b8c8ea9b22082a496deadf90447a326954e\", \"lessThan\": \"50c5248b0ea8aae0529fdf28dac42a41312d3b62\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"54f83b8c8ea9b22082a496deadf90447a326954e\", \"lessThan\": \"a0362cd6e503278add954123957fd47990e8d9bf\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"54f83b8c8ea9b22082a496deadf90447a326954e\", \"lessThan\": \"1a9df57d57452b104c46c918569143cf21d7ebf1\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"54f83b8c8ea9b22082a496deadf90447a326954e\", \"lessThan\": \"716cba46f73a92645cf13eded8d257ed48afc2a4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"54f83b8c8ea9b22082a496deadf90447a326954e\", \"lessThan\": \"973a57891608a98e894db2887f278777f564de18\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d7e3f2fe01372eb914d0e451f0e7a46cbcb98f9e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"85c9ece11264499890d0e9f0dee431ac1bda981c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"fc71e39a6c07440e6968227f3db1988f45d7a7b7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"94f5de2eefae22c449e367c2dacafe869af73e3f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"8212b44b7109bd30dbf7eb7f5ecbbc413757a7d7\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/usb/gadget/udc/core.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.4\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.4\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.320\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.282\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.224\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.165\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.105\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.46\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/usb/gadget/udc/core.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/ba15815dd24cc5ec0d23e2170dc58c7db1e03b4a\"}, {\"url\": \"https://git.kernel.org/stable/c/df8e734ae5e605348aa0ca2498aedb73e815f244\"}, {\"url\": \"https://git.kernel.org/stable/c/7cc9ebcfe58be22f18056ad8bc6272d120bdcb3e\"}, {\"url\": \"https://git.kernel.org/stable/c/50c5248b0ea8aae0529fdf28dac42a41312d3b62\"}, {\"url\": \"https://git.kernel.org/stable/c/a0362cd6e503278add954123957fd47990e8d9bf\"}, {\"url\": \"https://git.kernel.org/stable/c/1a9df57d57452b104c46c918569143cf21d7ebf1\"}, {\"url\": \"https://git.kernel.org/stable/c/716cba46f73a92645cf13eded8d257ed48afc2a4\"}, {\"url\": \"https://git.kernel.org/stable/c/973a57891608a98e894db2887f278777f564de18\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: gadget: core: Check for unset descriptor\\n\\nMake sure the descriptor has been set before looking at maxpacket.\\nThis fixes a null pointer panic in this case.\\n\\nThis may happen if the gadget doesn\u0027t properly set up the endpoint\\nfor the current speed, or the gadget descriptors are malformed and\\nthe descriptor for the speed/endpoint are not found.\\n\\nNo current gadget driver is known to have this problem, but this\\nmay cause a hard-to-find bug during development of new gadgets.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.320\", \"versionStartIncluding\": \"4.19.82\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.282\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.224\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.165\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.105\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.46\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10.5\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.11\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"3.16.80\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.4.199\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.9.199\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.14.152\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"5.3.9\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T12:58:29.741Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-44960\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T22:14:09.135Z\", \"dateReserved\": \"2024-08-21T05:34:56.666Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-09-04T18:35:58.469Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…