WID-SEC-W-2022-1870
Vulnerability from csaf_certbund
Published
2020-05-21 22:00
Modified
2024-07-23 22:00
Summary
Apache Tomcat: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache Tomcat ist ein Web-Applikationsserver für verschiedene Plattformen.
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Apache Tomcat ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuführen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache Tomcat ist ein Web-Applikationsserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Apache Tomcat ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1870 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-1870.json" }, { "category": "self", "summary": "WID-SEC-2022-1870 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1870" }, { "category": "external", "summary": "Meldung auf der OSS-Sec Mailingliste vom 2020-05-21", "url": "http://seclists.org/oss-sec/2020/q2/136" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1363-1 vom 2020-05-21", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-May/006843.html?_ga=2.119330250.237013701.1590127310-903099586.1569400373" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1364-1 vom 2020-05-21", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-May/006844.html?_ga=2.119330250.237013701.1590127310-903099586.1569400373" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1365-1 vom 2020-05-21", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-May/006842.html?_ga=2.119330250.237013701.1590127310-903099586.1569400373" }, { "category": "external", "summary": "Debian Security Advisory DLA 2217 vom 2020-05-23", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202005/msg00020.html" }, { "category": "external", "summary": "Debian Security Advisory DLA 2209 vom 2020-05-29", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202005/msg00026.html" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202005-18 vom 2020-06-01", "url": "https://security.archlinux.org/ASA-202005-18" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202005-20 vom 2020-06-01", "url": "https://security.archlinux.org/ASA-202005-20" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202005-19 vom 2020-06-01", "url": "https://security.archlinux.org/ASA-202005-19" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202006-7 vom 2020-06-06", "url": "https://security.archlinux.org/ASA-202006-7" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202006-6 vom 2020-06-06", "url": "https://security.archlinux.org/ASA-202006-6" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202006-5 vom 2020-06-06", "url": "https://security.archlinux.org/ASA-202006-5" }, { "category": "external", "summary": "GitHub User \"osamahamad\": CVE-2020-9484-Mass-Scan vom 2020-06-07", "url": "https://github.com/osamahamad/CVE-2020-9484-Mass-Scan" }, { "category": "external", "summary": "CentOS-announce CESA-2020:2530 vom 2020-06-11", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-2530-Important-CentOS-7-tomcat-Security-Update-td4645957.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2509 vom 2020-06-10", "url": "https://access.redhat.com/errata/RHSA-2020:2509" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2483 vom 2020-06-10", "url": "https://access.redhat.com/errata/RHSA-2020:2483" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2529 vom 2020-06-11", "url": "https://access.redhat.com/errata/RHSA-2020:2529" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2506 vom 2020-06-10", "url": "https://access.redhat.com/errata/RHSA-2020:2506" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2487 vom 2020-06-10", "url": "https://access.redhat.com/errata/RHSA-2020:2487" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2530 vom 2020-06-11", "url": "https://access.redhat.com/errata/RHSA-2020:2530" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2021-1491 vom 2021-03-25", "url": "https://alas.aws.amazon.com/ALAS-2021-1491.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1497-1 vom 2020-06-16", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201497-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1498-1 vom 2020-06-16", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201498-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:14375-1 vom 2020-06-16", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-202014375-1.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2279 vom 2020-07-13", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202007/msg00010.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0988-1 vom 2021-03-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008569.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0989-1 vom 2021-03-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008570.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2020-087 vom 2020-07-16", "url": "https://downloads.avaya.com/css/P8/documents/101069355" }, { "category": "external", "summary": "Debian Security Advisory DSA-4727 vom 2020-07-18", "url": "https://www.debian.org/security/2020/dsa-4727" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2020-076 vom 2020-07-18", "url": "https://downloads.avaya.com/css/P8/documents/101069459" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1009-1 vom 2021-04-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008578.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1008-1 vom 2021-04-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008576.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3017 vom 2020-07-27", "url": "https://access.redhat.com/errata/RHSA-2020:3017" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4448-1 vom 2020-08-04", "url": "https://usn.ubuntu.com/4448-1/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2021-1493 vom 2021-04-07", "url": "https://alas.aws.amazon.com/ALAS-2021-1493.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2020-096 vom 2020-10-04", "url": "https://downloads.avaya.com/css/P8/documents/101071185" }, { "category": "external", "summary": "McAfee Security Bulletin SB10332 vom 2020-10-15", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10332" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4596-1 vom 2020-10-21", "url": "https://usn.ubuntu.com/4596-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14705-1 vom 2021-04-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008669.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1431-1 vom 2021-04-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008703.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2596 vom 2021-03-16", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:2562 vom 2021-06-29", "url": "https://access.redhat.com/errata/RHSA-2021:2562" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:2561 vom 2021-06-29", "url": "https://access.redhat.com/errata/RHSA-2021:2561" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3140 vom 2021-08-11", "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3425 vom 2021-09-09", "url": "https://access.redhat.com/errata/RHSA-2021:3425" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-009 vom 2022-02-07", "url": "https://downloads.avaya.com/css/P8/documents/101080449" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1572 vom 2022-03-08", "url": "https://alas.aws.amazon.com/ALAS-2022-1572.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5360-1 vom 2022-03-31", "url": "https://ubuntu.com/security/notices/USN-5360-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-044 vom 2022-04-22", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-044.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3160 vom 2022-10-26", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5265 vom 2022-10-30", "url": "https://lists.debian.org/debian-security-announce/2022/msg00235.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASTOMCAT9-2023-003 vom 2023-09-27", "url": "https://alas.aws.amazon.com/AL2/ALASTOMCAT9-2023-003.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASTOMCAT8.5-2023-009 vom 2023-09-27", "url": "https://alas.aws.amazon.com/AL2/ALASTOMCAT8.5-2023-009.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASTOMCAT8.5-2023-008 vom 2023-09-27", "url": "https://alas.aws.amazon.com/AL2/ALASTOMCAT8.5-2023-008.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASTOMCAT8.5-2023-004 vom 2023-09-27", "url": "https://alas.aws.amazon.com/AL2/ALASTOMCAT8.5-2023-004.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6908-1 vom 2024-07-23", "url": "https://ubuntu.com/security/notices/USN-6908-1" } ], "source_lang": "en-US", "title": "Apache Tomcat: Schwachstelle erm\u00f6glicht Ausf\u00fchren von beliebigem Programmcode mit den Rechten des Dienstes", "tracking": { "current_release_date": "2024-07-23T22:00:00.000+00:00", "generator": { "date": "2024-07-24T09:11:12.382+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1870", "initial_release_date": "2020-05-21T22:00:00.000+00:00", "revision_history": [ { "date": "2020-05-21T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-05-24T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-05-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-06-01T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Arch Linux aufgenommen" }, { "date": "2020-06-07T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Arch Linux aufgenommen; PoC aufgenommen" }, { "date": "2020-06-11T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von CentOS" }, { "date": "2020-06-16T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-07-12T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-07-15T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2020-07-19T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Debian und AVAYA aufgenommen" }, { "date": "2020-07-27T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-08-04T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2020-10-04T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2020-10-14T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von McAfee aufgenommen" }, { "date": "2020-10-21T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2021-03-15T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-03-25T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2021-03-30T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-04-05T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-04-07T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2021-04-21T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-04-29T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-06-28T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-11T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-08T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-02T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-03-08T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-03-31T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-04-24T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-10-26T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-10-30T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-09-27T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-07-23T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "33" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.0-M5", "product": { "name": "Apache Tomcat \u003c10.0.0-M5", "product_id": "T016582", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:10.0.0-m5" } } }, { "category": "product_version_range", "name": "\u003c9.0.35", "product": { "name": "Apache Tomcat \u003c9.0.35", "product_id": "T016583", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:9.0.35" } } }, { "category": "product_version_range", "name": "\u003c8.5.55", "product": { "name": "Apache Tomcat \u003c8.5.55", "product_id": "T016584", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:8.5.55" } } }, { "category": "product_version_range", "name": "\u003c7.0.104", "product": { "name": "Apache Tomcat \u003c7.0.104", "product_id": "T016585", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:7.0.104" } } } ], "category": "product_name", "name": "Tomcat" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya one-X", "product": { "name": "Avaya one-X", "product_id": "1024", "product_identification_helper": { "cpe": "cpe:/a:avaya:one-x:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "McAfee ePolicy Orchestrator", "product": { "name": "McAfee ePolicy Orchestrator", "product_id": "6798", "product_identification_helper": { "cpe": "cpe:/a:mcafee:epolicy_orchestrator:-" } } } ], "category": "vendor", "name": "McAfee" }, { "branches": [ { "category": "product_name", "name": "Open Source Arch Linux", "product": { "name": "Open Source Arch Linux", "product_id": "T013312", "product_identification_helper": { "cpe": "cpe:/o:archlinux:archlinux:-" } } }, { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-9484", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Apache Tomcat. Sie beruht auf einem Fehler bei der Verarbeitung \u00fcbermittelter Daten. Ein Angreifer kann dieses nutzen und Code mit den Privilegien des angegriffenen Dienstes zur Ausf\u00fchrung bringen. Voraussetzung f\u00fcr einen erfolgreichen Angriff ist, dass der Angreifer Name und Inhalt einer Datei auf dem Server zu steuern, der Server so konfiguriert ist, dass er den PersistenceManager mit einem FileStore nutzt, der PersistenceManager mit der Einstellung sessionAttributeValueClassNameFilter=\"null\" konfiguriert ist (oder eine schwache Filtereinstellung es dem Angreifer erm\u00f6glicht, ein Objekt deserialisieren zu lassen) und dass der Angreifer den relativen Dateipfad vom Speicheror, der von FileStore f\u00fcr die Datei verwendet wird, kennt und dar\u00fcber die Kontrolle hat." } ], "product_status": { "known_affected": [ "T015519", "2951", "T002207", "67646", "T015516", "1024", "T000126", "T013312", "6798", "398363", "1727" ] }, "release_date": "2020-05-21T22:00:00Z", "title": "CVE-2020-9484" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.