fkie_cve-2015-0209
Vulnerability from fkie_nvd
Published
2015-03-19 22:59
Modified
2024-11-21 02:22
Severity ?
Summary
Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openssl | openssl | * | |
openssl | openssl | 1.0.0 | |
openssl | openssl | 1.0.0a | |
openssl | openssl | 1.0.0b | |
openssl | openssl | 1.0.0c | |
openssl | openssl | 1.0.0d | |
openssl | openssl | 1.0.0e | |
openssl | openssl | 1.0.0f | |
openssl | openssl | 1.0.0g | |
openssl | openssl | 1.0.0h | |
openssl | openssl | 1.0.0i | |
openssl | openssl | 1.0.0j | |
openssl | openssl | 1.0.0k | |
openssl | openssl | 1.0.0l | |
openssl | openssl | 1.0.0m | |
openssl | openssl | 1.0.0n | |
openssl | openssl | 1.0.0o | |
openssl | openssl | 1.0.0p | |
openssl | openssl | 1.0.0q | |
openssl | openssl | 1.0.1 | |
openssl | openssl | 1.0.1a | |
openssl | openssl | 1.0.1b | |
openssl | openssl | 1.0.1c | |
openssl | openssl | 1.0.1d | |
openssl | openssl | 1.0.1e | |
openssl | openssl | 1.0.1f | |
openssl | openssl | 1.0.1g | |
openssl | openssl | 1.0.1h | |
openssl | openssl | 1.0.1i | |
openssl | openssl | 1.0.1j | |
openssl | openssl | 1.0.1k | |
openssl | openssl | 1.0.1l | |
openssl | openssl | 1.0.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", matchCriteriaId: "FE2907ED-57AA-41E4-9AC6-055F138B9204", versionEndIncluding: "0.9.8ze", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*", matchCriteriaId: "2FBD8C92-6138-4274-ACBA-D7D42DAEC5AC", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*", matchCriteriaId: "10FF0A06-DA61-4250-B083-67E55E362677", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*", matchCriteriaId: "8A6BA453-C150-4159-B80B-5465EFF83F11", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*", matchCriteriaId: "638A2E69-8AB6-4FEA-852A-FEF16A500C1A", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*", matchCriteriaId: "56C47D3A-B99D-401D-B6B8-1194B2DB4809", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*", matchCriteriaId: "08355B10-E004-4BE6-A5AE-4D428810580B", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*", matchCriteriaId: "738BCFDC-1C49-4774-95AE-E099F707DEF9", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*", matchCriteriaId: "D4B242C0-D27D-4644-AD19-5ACB853C9DC2", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*", matchCriteriaId: "8DC683F2-4346-4E5E-A8D7-67B4F4D7827B", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*", matchCriteriaId: "764B7D38-BC1B-47DB-B1DF-D092BDA4BFCB", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*", matchCriteriaId: "6604E7BE-9F9B-444D-A63A-F65D1CFDF3BF", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*", matchCriteriaId: "132B9217-B0E0-4E3E-9096-162AA28E158E", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*", matchCriteriaId: "7619F9A0-9054-4217-93D1-3EA64876C5B0", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*", matchCriteriaId: "6D82C405-17E2-4DF1-8DF5-315BD5A41595", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*", matchCriteriaId: "4C96806F-4718-4BD3-9102-55A26AA86498", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*", matchCriteriaId: "8A16CD99-AF7F-4931-AD2E-77727BA18FBD", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0p:*:*:*:*:*:*:*", matchCriteriaId: "88440697-754A-47A7-BF83-4D0EB68FFB10", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.0q:*:*:*:*:*:*:*", matchCriteriaId: "AD51F0FC-F426-4AE5-B3B9-B813C580EBAE", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "2D1C00C0-C77E-4255-9ECA-20F2673C7366", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", matchCriteriaId: "3A66E6CF-39CF-412E-8EF0-8E10BA21B4A4", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", matchCriteriaId: "C684FB18-FDDC-4BED-A28C-C23EE6CD0094", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", matchCriteriaId: "A74A79A7-4FAF-4C81-8622-050008B96AE1", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", matchCriteriaId: "CEDACCB9-8D61-49EE-9957-9E58BC7BB031", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", matchCriteriaId: "4993DD56-F9E3-4AC8-AC3E-BF204B950DEC", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", matchCriteriaId: "E884B241-F9C3-44F8-A420-DE65F5F3D660", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", matchCriteriaId: "3A383620-B4F7-44A7-85DA-A4FF2E115D80", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*", matchCriteriaId: "5F0C6812-F455-49CF-B29B-9AC00306DA43", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*", matchCriteriaId: "3F2D462C-A1B4-4572-A615-BDE9DC5F1E55", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*", matchCriteriaId: "3703E445-17C0-4C85-A496-A35641C0C8DB", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*", matchCriteriaId: "2F4034B9-EF1C-40E6-B92A-D4D7B7E7E774", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*", matchCriteriaId: "ABEC1927-F469-4B9E-B544-DA6CF90F0B34", vulnerable: true, }, { criteria: "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "AD3E5C1B-EC63-4214-A0BD-0B8681CE6C8B", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.", }, { lang: "es", value: "Vulnerabilidad de uso después de liberación en la función d2i_ECPrivateKey en crypto/ec/ec_asn1.c en OpenSSL anterior a 0.9.8zf, 1.0.0 anterior a 1.0.0r, 1.0.1 anterior a 1.0.1m, y 1.0.2 anterior a 1.0.2a podría permitir a atacantes remotos causar una denegación de servicio (corrupción de memoria y caída de aplicación) o posiblemente tener otro impacto no especificado a través de un fichero de clave privada Elliptic Curve (EC) malformado que se maneja incorrectamente durante su importación.", }, ], evaluatorComment: "<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", id: "CVE-2015-0209", lastModified: "2024-11-21T02:22:33.237", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2015-03-19T22:59:02.617", references: [ { source: "secalert@redhat.com", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { source: "secalert@redhat.com", url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { source: "secalert@redhat.com", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { source: "secalert@redhat.com", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { source: "secalert@redhat.com", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { source: "secalert@redhat.com", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", }, { source: "secalert@redhat.com", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", }, { source: "secalert@redhat.com", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", }, { source: "secalert@redhat.com", url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { source: "secalert@redhat.com", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { source: "secalert@redhat.com", url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", }, { source: "secalert@redhat.com", url: "http://marc.info/?l=bugtraq&m=142841429220765&w=2", }, { source: "secalert@redhat.com", url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { source: "secalert@redhat.com", url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { source: "secalert@redhat.com", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { source: "secalert@redhat.com", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { source: "secalert@redhat.com", url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { source: "secalert@redhat.com", url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2016-1089.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { source: "secalert@redhat.com", url: "http://support.apple.com/kb/HT204942", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2015/dsa-3197", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { source: "secalert@redhat.com", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { source: "secalert@redhat.com", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { source: "secalert@redhat.com", url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { source: "secalert@redhat.com", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { source: "secalert@redhat.com", url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { source: "secalert@redhat.com", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/73239", }, { source: "secalert@redhat.com", url: "http://www.securitytracker.com/id/1031929", }, { source: "secalert@redhat.com", url: "http://www.ubuntu.com/usn/USN-2537-1", }, { source: "secalert@redhat.com", url: "https://access.redhat.com/articles/1384453", }, { source: "secalert@redhat.com", url: "https://bto.bluecoat.com/security-advisory/sa92", }, { source: "secalert@redhat.com", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1196737", }, { source: "secalert@redhat.com", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, { source: "secalert@redhat.com", url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a", }, { source: "secalert@redhat.com", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { source: "secalert@redhat.com", url: "https://security.gentoo.org/glsa/201503-11", }, { source: "secalert@redhat.com", url: "https://support.citrix.com/article/CTX216642", }, { source: "secalert@redhat.com", url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "https://www.openssl.org/news/secadv_20150319.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142841429220765&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2016-1089.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.apple.com/kb/HT204942", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2015/dsa-3197", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/73239", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id/1031929", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/USN-2537-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://access.redhat.com/articles/1384453", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bto.bluecoat.com/security-advisory/sa92", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1196737", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201503-11", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.citrix.com/article/CTX216642", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.openssl.org/news/secadv_20150319.txt", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.