var-200401-0045
Vulnerability from variot
Cisco PIX firewall 6.2.x through 6.2.3, when configured as a VPN Client, allows remote attackers to cause a denial of service (dropped IPSec tunnel connection) via an IKE Phase I negotiation request to the outside interface of the firewall. Cisco PIX has been reported prone to multiple remote denial of service vulnerabilities. The first issue has been reported to present itself when the affected PIX firewall processes an SNMPv3 message, in certain circumstances. Specifically, if the Cisco PIX device receives and processes an SNMPv3 message, the PIX firewall will crash and reload. PIX Firewall is prone to a denial-of-service vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200401-0045", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pix firewall", "scope": "eq", "trust": 2.0, "vendor": "cisco", "version": "6.2" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.2\\(3\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.2\\(2\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.2\\(3.100\\)" }, { "model": "pix firewall", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.2.2_.111" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.2\\(1\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.2.2.111" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.2(3)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.2(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.2(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.2\\(3\\)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.2\\(1\\)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.2\\(2\\)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.2\\(3.100\\)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(3.100)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1.4" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(5)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(4)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(3)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0.4" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(4.101)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(4)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3(3)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3(1.200)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(9)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(7)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(6)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(5)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(3.210)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.4" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1(4.206)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1(0.208)" }, { "model": "pix firewall", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.3.2" }, { "model": "pix firewall", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.2.3" }, { "model": "pix firewall", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.1.5" } ], "sources": [ { "db": "BID", "id": "9221" }, { "db": "BID", "id": "77833" }, { "db": "JVNDB", "id": "JVNDB-2003-000378" }, { "db": "NVD", "id": "CVE-2003-1004" }, { "db": "CNNVD", "id": "CNNVD-200401-021" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3.100\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2003-1004" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor announced these vulnerabilities.", "sources": [ { "db": "BID", "id": "9221" } ], "trust": 0.3 }, "cve": "CVE-2003-1004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2003-1004", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-7829", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2003-1004", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200401-021", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-7829", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2003-1004", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-7829" }, { "db": "VULMON", "id": "CVE-2003-1004" }, { "db": "JVNDB", "id": "JVNDB-2003-000378" }, { "db": "NVD", "id": "CVE-2003-1004" }, { "db": "CNNVD", "id": "CNNVD-200401-021" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco PIX firewall 6.2.x through 6.2.3, when configured as a VPN Client, allows remote attackers to cause a denial of service (dropped IPSec tunnel connection) via an IKE Phase I negotiation request to the outside interface of the firewall. Cisco PIX has been reported prone to multiple remote denial of service vulnerabilities. \nThe first issue has been reported to present itself when the affected PIX firewall processes an SNMPv3 message, in certain circumstances. Specifically, if the Cisco PIX device receives and processes an SNMPv3 message, the PIX firewall will crash and reload. PIX Firewall is prone to a denial-of-service vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2003-1004" }, { "db": "JVNDB", "id": "JVNDB-2003-000378" }, { "db": "BID", "id": "9221" }, { "db": "BID", "id": "77833" }, { "db": "VULHUB", "id": "VHN-7829" }, { "db": "VULMON", "id": "CVE-2003-1004" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2003-1004", "trust": 2.9 }, { "db": "BID", "id": "9221", "trust": 1.1 }, { "db": "SECTRACK", "id": "1008475", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2003-000378", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200401-021", "trust": 0.7 }, { "db": "CISCO", "id": "20031215 CISCO PIX VULNERABILITIES", "trust": 0.6 }, { "db": "BID", "id": "77833", "trust": 0.5 }, { "db": "VULHUB", "id": "VHN-7829", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2003-1004", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-7829" }, { "db": "VULMON", "id": "CVE-2003-1004" }, { "db": "BID", "id": "9221" }, { "db": "BID", "id": "77833" }, { "db": "JVNDB", "id": "JVNDB-2003-000378" }, { "db": "NVD", "id": "CVE-2003-1004" }, { "db": "CNNVD", "id": "CNNVD-200401-021" } ] }, "id": "VAR-200401-0045", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-7829" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:21:15.014000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20031215-pix", "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-pix.shtml" }, { "title": "Cisco: Cisco PIX Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20031215-pix" } ], "sources": [ { "db": "VULMON", "id": "CVE-2003-1004" }, { "db": "JVNDB", "id": "JVNDB-2003-000378" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2003-1004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-pix.shtml" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-1004" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-1004" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/9221" }, { "trust": 0.8, "url": "http://www.securitytracker.com/alerts/2003/dec/1008475.html" }, { "trust": 0.3, "url": "http://www.cisco.com" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/77833" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=7085" } ], "sources": [ { "db": "VULHUB", "id": "VHN-7829" }, { "db": "VULMON", "id": "CVE-2003-1004" }, { "db": "BID", "id": "9221" }, { "db": "BID", "id": "77833" }, { "db": "JVNDB", "id": "JVNDB-2003-000378" }, { "db": "NVD", "id": "CVE-2003-1004" }, { "db": "CNNVD", "id": "CNNVD-200401-021" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-7829" }, { "db": "VULMON", "id": "CVE-2003-1004" }, { "db": "BID", "id": "9221" }, { "db": "BID", "id": "77833" }, { "db": "JVNDB", "id": "JVNDB-2003-000378" }, { "db": "NVD", "id": "CVE-2003-1004" }, { "db": "CNNVD", "id": "CNNVD-200401-021" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-01-05T00:00:00", "db": "VULHUB", "id": "VHN-7829" }, { "date": "2004-01-05T00:00:00", "db": "VULMON", "id": "CVE-2003-1004" }, { "date": "2003-12-15T00:00:00", "db": "BID", "id": "9221" }, { "date": "2004-01-05T00:00:00", "db": "BID", "id": "77833" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000378" }, { "date": "2004-01-05T05:00:00", "db": "NVD", "id": "CVE-2003-1004" }, { "date": "2004-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200401-021" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-7829" }, { "date": "2018-10-30T00:00:00", "db": "VULMON", "id": "CVE-2003-1004" }, { "date": "2003-12-15T00:00:00", "db": "BID", "id": "9221" }, { "date": "2004-01-05T00:00:00", "db": "BID", "id": "77833" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000378" }, { "date": "2018-10-30T16:26:18.060000", "db": "NVD", "id": "CVE-2003-1004" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200401-021" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "9221" }, { "db": "BID", "id": "77833" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco PIX Firewall In VPNC IPSec Vulnerability that can break the tunnel", "sources": [ { "db": "JVNDB", "id": "JVNDB-2003-000378" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "unknown", "sources": [ { "db": "CNNVD", "id": "CNNVD-200401-021" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.