CVE-2007-4758
Vulnerability from cvelistv5
Published
2007-09-08 10:00
Modified
2024-08-07 15:08
Severity ?
Summary
Multiple buffer overflows in the image-processing APIs in Cosminexus Developer's Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors.
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:08:33.769Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
          },
          {
            "name": "26538",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26538"
          },
          {
            "name": "ADV-2007-3034",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3034"
          },
          {
            "name": "37857",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37857"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-11-15T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
        },
        {
          "name": "26538",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26538"
        },
        {
          "name": "ADV-2007-3034",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3034"
        },
        {
          "name": "37857",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37857"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4758",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html",
              "refsource": "CONFIRM",
              "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
            },
            {
              "name": "26538",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26538"
            },
            {
              "name": "ADV-2007-3034",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3034"
            },
            {
              "name": "37857",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37857"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4758",
    "datePublished": "2007-09-08T10:00:00",
    "dateReserved": "2007-09-07T00:00:00",
    "dateUpdated": "2024-08-07T15:08:33.769Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-4758\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-09-08T10:17:00.000\",\"lastModified\":\"2011-03-08T02:59:08.643\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple buffer overflows in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de b\u00fafer en las APIs image-processing del Kit para Java: Cosminexus Developer\u0027s de Cosminexus 4 hasta 7 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio \u00f3 ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":10.0},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"F6FE70C8-749C-40A0-B087-14FDB6097CD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:hpux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"2FE5D346-61E9-489B-9529-AA559E111DCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"E0E60F8E-0116-4215-8E52-1A663ECB834B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"4FAC97A3-04E7-425C-AD8F-B75838E975FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"5A9DA03E-0164-465C-A819-E3AA7A0ECD89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"F2FB1026-648E-4FF0-AE95-F5D3115CA67F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"3B1FFC3F-0948-446F-8539-D6362377DBFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"2921E3C5-EF08-4612-B72E-7DABC0A8142E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_02:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"BD3A10B2-C904-45FD-9DAE-30DC00FA7326\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_03:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F6D8E1AA-B2CA-4029-8F25-35EEB0F15891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"48E93BDB-BB6D-4D1C-B3DD-3518E045F753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux:*:*:*:*:*\",\"matchCriteriaId\":\"82648C13-1D91-4C4C-A17B-64BCC5A24147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"12382EE9-4D34-4724-9023-5F6C48944F4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"8453ECF8-9419-4AD3-9541-B362FA58E4E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"B0316DD8-E2EB-4953-96BC-894B87D6C815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"CD5BC0AF-7872-4FC3-91CE-78EB0AF481F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:hpux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"4103CEB4-1EAD-4359-A519-A90DC885ABDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:linux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"803D406B-49B9-45C5-AA8E-86ACD1A7D5D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"0F715E02-BCFE-46E9-B3EC-53A3B9207426\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:7_20:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"B64A3CE1-C2DC-470C-BDFB-2242C3A5614D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:7_20_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"DFB8F345-6CA2-45FF-B583-BABB75A7947D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"1F7055A9-7A8A-4EB0-B202-220825B3FBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:hpux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"4919D1DA-37C9-4C18-8F5B-C0BC6F6915D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"20ED59C6-CD06-4FE1-A484-A7E642F33AFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"58266C54-32FE-4E5D-94A8-4291A87208EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F7043AE7-5CB7-4A64-B4FA-DE4A9C393146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:hpux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"5320D21A-C58E-47ED-8F7D-563F5A8E97CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:liniux:*:*:*:*:*\",\"matchCriteriaId\":\"253875EB-69D3-4D64-926A-71108AAF347F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"9535228E-72D4-4779-9A31-6F82D2B84B01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"5FBAAC3A-A4BD-4C12-85E4-D1535E7702BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_02:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"03E3C4E7-975C-4377-B2A7-EB5EB19F3C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_03:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"A8A86ABB-0383-4C45-9E97-BB4DCC5CCE66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"E24A1554-C2AB-4931-8D27-9225EFE7B6C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux:*:*:*:*:*\",\"matchCriteriaId\":\"930CA326-7B3E-4C46-8DD1-CB17CD0CC5FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"6511A0F9-6B01-49E1-8693-B6EC044DDB3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"0E5A504F-C4B1-44EC-A7AC-8690CF925B0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"84BE463B-0A3E-477C-B912-966625887D65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"C4A7C88F-8B18-4D58-AC37-90E2AE658AEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:hpux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"317A5BF8-0663-4D1A-8172-B90B962E0466\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:linux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"C5DF4BB1-43AE-4743-9F06-43B643D33EEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"42A988DB-2BA0-45B2-872C-D2A29CEA9FBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_20:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6C6D711C-6F5F-436E-BF01-E26864A5E887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_20_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"50F294FD-E70E-481A-809C-650320FEB9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"0CADDEE7-D529-4644-9A5F-6235AD072CCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"665CBCC5-7598-47C1-97F7-8FDF1A67E98F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_01:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"A823185B-DB4D-4076-9B41-5C0736C39EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"7EF49ED1-F86B-4F29-AC16-BDA1AEDD6FA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_02:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"C0B5CCBA-6DAE-4F4A-8113-536D2DD1A2D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_03:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6F95EE9A-7567-45D4-8730-EC4F6D8FA540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"CED6A3B7-F58D-47BE-81DB-59AC0DFC7F41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:linux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"5B35D672-2560-4783-A74E-9FBDE3059A47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"E56AD9B5-404C-4B36-B625-15A69336B697\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10_01:*:linux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"4027CD44-E1E5-4CA3-AC5F-41A4B21B74AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"FC4633F6-5779-4196-B8AF-C3DD4089D43B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_20:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"C7FB7277-F1D3-4492-9CB2-95E0E8D3FACF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:7_20_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"B5B8AA9F-4D66-4A33-AF2C-95AAAEE2E917\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/37857\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/26538\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3034\",\"source\":\"cve@mitre.org\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.