cve-2008-0902
Vulnerability from cvelistv5
Published
2008-02-22 21:00
Modified
2024-08-07 08:01
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and Express 6.1 through 10.0 MP1 allow remote attackers to inject arbitrary web script or HTML via unspecified samples. NOTE: this might be the same issue as CVE-2007-2694.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:40.105Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "BEA08-80.04", "tags": [ "vendor-advisory", "x_refsource_BEA", "x_transferred" ], "url": "http://dev2dev.bea.com/pub/advisory/273" }, { "name": "29041", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29041" }, { "name": "ADV-2008-0612", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0612/references" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and Express 6.1 through 10.0 MP1 allow remote attackers to inject arbitrary web script or HTML via unspecified samples. NOTE: this might be the same issue as CVE-2007-2694." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-03-11T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "BEA08-80.04", "tags": [ "vendor-advisory", "x_refsource_BEA" ], "url": "http://dev2dev.bea.com/pub/advisory/273" }, { "name": "29041", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29041" }, { "name": "ADV-2008-0612", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0612/references" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0902", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and Express 6.1 through 10.0 MP1 allow remote attackers to inject arbitrary web script or HTML via unspecified samples. NOTE: this might be the same issue as CVE-2007-2694." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "BEA08-80.04", "refsource": "BEA", "url": "http://dev2dev.bea.com/pub/advisory/273" }, { "name": "29041", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29041" }, { "name": "ADV-2008-0612", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0612/references" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0902", "datePublished": "2008-02-22T21:00:00", "dateReserved": "2008-02-22T00:00:00", "dateUpdated": "2024-08-07T08:01:40.105Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FDCF6AE-43DC-4AE5-9260-CA657F40BE77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DFE26B3-31F2-4FC0-854D-56EA4D08C28A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"63017BF8-D681-45EC-9C31-09D029F1126D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E0B1791-974A-4967-8CF9-33BE8183200B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B12A8B1-F78E-46B3-8872-4C6484345477\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB2FB0E9-3812-49C5-94F4-3B39D5BE2EED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B091903-943F-4822-9F24-9D109B2D76A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:6.1:sp7:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4DACAC1-ABEC-4310-A0FF-B69EF9BCF273\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9C5AFCF-79D8-4005-B800-B0C6BD461276\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"6828CE4B-91E8-4688-977F-DC7BC21131C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E141AA86-C6D0-4FA8-9268-0FB0635DF9CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"893D9D88-43C4-4F9F-A364-0585DE6FA9E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*\", \"matchCriteriaId\": \"D34E2925-DE2A-437F-B349-BD7103F4C37E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*\", \"matchCriteriaId\": \"16E3F943-D920-4C0A-8545-5CF7D792011F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*\", \"matchCriteriaId\": \"B46A3EBE-B268-427E-AAB5-62DDF255F1D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:7.0:sp7:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5D61A68-E83A-4374-832A-C9A2FEA0AD6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E08D4CEA-9ACC-4869-BC87-3524A059914F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F5B2A06-CE19-4A57-9566-09FC1E259CDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D18E22CC-A0FC-4BC7-AD39-2645F57486C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9429D939-FCC4-4BA7-90C4-BBEECE7309D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*\", \"matchCriteriaId\": \"0653ACAC-B0D9-4381-AB23-11D24852A414\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A489A8E-D3AE-42DF-8DCF-5A9EF10778FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:sp6:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A75A7F9-A99A-4C8E-9867-71FA8A55DD70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:9.0:ga:*:*:*:*:*:*\", \"matchCriteriaId\": \"98F632B9-0572-4563-BA41-262628A5CB7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:9.1:ga:*:*:*:*:*:*\", \"matchCriteriaId\": \"A585B339-442B-4408-9A44-E872FF4406A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60F9ABCC-5217-4650-8C71-F8B0EB86789F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea_systems:weblogic_server:10.0_mp1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D4B4A86-A381-4DB1-AA9D-57DBEC2466CF\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and Express 6.1 through 10.0 MP1 allow remote attackers to inject arbitrary web script or HTML via unspecified samples. NOTE: this might be the same issue as CVE-2007-2694.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en BEA WebLogic Server y Express de 6.1 a 10.0 MP1 permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\\u00f3n a trav\\u00e9s de muestras no especificadas. NOTA: podr\\u00eda ser la misma vulnerabilidad que CVE-2007-2694.\"}]", "id": "CVE-2008-0902", "lastModified": "2024-11-21T00:43:11.160", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", "published": "2008-02-22T21:44:00.000", "references": "[{\"url\": \"http://dev2dev.bea.com/pub/advisory/273\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/29041\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0612/references\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://dev2dev.bea.com/pub/advisory/273\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/29041\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0612/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2008-0902\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-02-22T21:44:00.000\",\"lastModified\":\"2024-11-21T00:43:11.160\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and Express 6.1 through 10.0 MP1 allow remote attackers to inject arbitrary web script or HTML via unspecified samples. NOTE: this might be the same issue as CVE-2007-2694.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en BEA WebLogic Server y Express de 6.1 a 10.0 MP1 permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de muestras no especificadas. NOTA: podr\u00eda ser la misma vulnerabilidad que CVE-2007-2694.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FDCF6AE-43DC-4AE5-9260-CA657F40BE77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DFE26B3-31F2-4FC0-854D-56EA4D08C28A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"63017BF8-D681-45EC-9C31-09D029F1126D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E0B1791-974A-4967-8CF9-33BE8183200B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B12A8B1-F78E-46B3-8872-4C6484345477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB2FB0E9-3812-49C5-94F4-3B39D5BE2EED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B091903-943F-4822-9F24-9D109B2D76A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:6.1:sp7:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4DACAC1-ABEC-4310-A0FF-B69EF9BCF273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9C5AFCF-79D8-4005-B800-B0C6BD461276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6828CE4B-91E8-4688-977F-DC7BC21131C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E141AA86-C6D0-4FA8-9268-0FB0635DF9CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"893D9D88-43C4-4F9F-A364-0585DE6FA9E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D34E2925-DE2A-437F-B349-BD7103F4C37E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E3F943-D920-4C0A-8545-5CF7D792011F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*\",\"matchCriteriaId\":\"B46A3EBE-B268-427E-AAB5-62DDF255F1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp7:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D61A68-E83A-4374-832A-C9A2FEA0AD6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E08D4CEA-9ACC-4869-BC87-3524A059914F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F5B2A06-CE19-4A57-9566-09FC1E259CDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D18E22CC-A0FC-4BC7-AD39-2645F57486C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9429D939-FCC4-4BA7-90C4-BBEECE7309D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0653ACAC-B0D9-4381-AB23-11D24852A414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A489A8E-D3AE-42DF-8DCF-5A9EF10778FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp6:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A75A7F9-A99A-4C8E-9867-71FA8A55DD70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:9.0:ga:*:*:*:*:*:*\",\"matchCriteriaId\":\"98F632B9-0572-4563-BA41-262628A5CB7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:9.1:ga:*:*:*:*:*:*\",\"matchCriteriaId\":\"A585B339-442B-4408-9A44-E872FF4406A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F9ABCC-5217-4650-8C71-F8B0EB86789F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea_systems:weblogic_server:10.0_mp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D4B4A86-A381-4DB1-AA9D-57DBEC2466CF\"}]}]}],\"references\":[{\"url\":\"http://dev2dev.bea.com/pub/advisory/273\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/29041\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0612/references\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://dev2dev.bea.com/pub/advisory/273\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/29041\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0612/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.