var-200701-0166
Vulnerability from variot
SQL injection vulnerability in blocks/block-Old_Articles.php in Francisco Burzi PHP-Nuke 7.9 and earlier, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the cat parameter. PHP-Nuke is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation. PHP-Nuke 7.9 and prior versions are vulnerable; other versions may also be affected.
Secunia is proud to announce the availability of the Secunia Software Inspector.
The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor.
Try it out online: http://secunia.com/software_inspector/
TITLE: PHP-Nuke "cat" Old Articles Block SQL Injection
SECUNIA ADVISORY ID: SA23748
VERIFY ADVISORY: http://secunia.com/advisories/23748/
CRITICAL: Moderately critical
IMPACT: Manipulation of data, Exposure of sensitive information
WHERE:
From remote
SOFTWARE: PHP-Nuke 7.x http://secunia.com/product/2385/
DESCRIPTION: Paisterist has discovered a vulnerability in PHP-Nuke, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed to the "cat" parameter through index.php to blocks/block-Old_Articles.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Successful exploitation e.g. allows retrieval of administrator usernames and password hashes, but requires that "register_globals" is enabled, "magic_quotes_gpc" is disabled, and the attacker knows the prefix for the database tables.
The vulnerability is confirmed in version 7.9.
SOLUTION: Edit the source code to ensure that input is properly sanitised.
Use another product.
PROVIDED AND/OR DISCOVERED BY: Paisterist
ORIGINAL ADVISORY: http://www.neosecurityteam.net/advisories/PHP-Nuke-7.9-Old-Articles-Block-cat-SQL-Injection-vulnerability-31.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200701-0166", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "php-nuke", "scope": "lte", "trust": 1.8, "vendor": "francisco burzi", "version": "7.9" }, { "model": "php-nuke", "scope": "eq", "trust": 0.6, "vendor": "francisco burzi", "version": "7.9" }, { "model": "php-nuke", "scope": "eq", "trust": 0.3, "vendor": "php nuke", "version": "7.9" }, { "model": "php-nuke", "scope": "eq", "trust": 0.3, "vendor": "php nuke", "version": "7.8" }, { "model": "php-nuke", "scope": "eq", "trust": 0.3, "vendor": "php nuke", "version": "7.7" }, { "model": "php-nuke", "scope": "eq", "trust": 0.3, "vendor": "php nuke", "version": "7.6" }, { "model": "php-nuke", "scope": "eq", "trust": 0.3, "vendor": "php nuke", "version": "7.5" }, { "model": "php-nuke", "scope": "eq", "trust": 0.3, "vendor": "php nuke", "version": "7.4" }, { "model": "php-nuke", "scope": "eq", "trust": 0.3, "vendor": "php nuke", "version": "7.3" }, { "model": "php-nuke", "scope": "eq", "trust": 0.3, "vendor": "php nuke", "version": "7.2" }, { "model": "php-nuke", "scope": "eq", "trust": 0.3, "vendor": "php nuke", "version": "7.1" }, { "model": "php-nuke", "scope": "eq", "trust": 0.3, "vendor": "php nuke", "version": "7.0" } ], "sources": [ { "db": "BID", "id": "22037" }, { "db": "JVNDB", "id": "JVNDB-2007-001393" }, { "db": "NVD", "id": "CVE-2007-0309" }, { "db": "CNNVD", "id": "CNNVD-200701-250" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:francisco_burzi:php-nuke:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.9", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2007-0309" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Paisterist is credited with the discovery of this vulnerability.", "sources": [ { "db": "BID", "id": "22037" }, { "db": "CNNVD", "id": "CNNVD-200701-250" } ], "trust": 0.9 }, "cve": "CVE-2007-0309", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2007-0309", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-23671", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2007-0309", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200701-250", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-23671", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-23671" }, { "db": "JVNDB", "id": "JVNDB-2007-001393" }, { "db": "NVD", "id": "CVE-2007-0309" }, { "db": "CNNVD", "id": "CNNVD-200701-250" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SQL injection vulnerability in blocks/block-Old_Articles.php in Francisco Burzi PHP-Nuke 7.9 and earlier, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the cat parameter. PHP-Nuke is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. \nExploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation. \nPHP-Nuke 7.9 and prior versions are vulnerable; other versions may also be affected. \n\n----------------------------------------------------------------------\n\nSecunia is proud to announce the availability of the Secunia Software\nInspector. \n\nThe Secunia Software Inspector is a free service that detects insecure\nversions of software that you may have installed in your system. When\ninsecure versions are detected, the Secunia Software Inspector also\nprovides thorough guidelines for updating the software to the latest\nsecure version from the vendor. \n\nTry it out online:\nhttp://secunia.com/software_inspector/\n\n----------------------------------------------------------------------\n\nTITLE:\nPHP-Nuke \"cat\" Old Articles Block SQL Injection\n\nSECUNIA ADVISORY ID:\nSA23748\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/23748/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nManipulation of data, Exposure of sensitive information\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nPHP-Nuke 7.x\nhttp://secunia.com/product/2385/\n\nDESCRIPTION:\nPaisterist has discovered a vulnerability in PHP-Nuke, which can be\nexploited by malicious people to conduct SQL injection attacks. \n\nInput passed to the \"cat\" parameter through index.php to\nblocks/block-Old_Articles.php is not properly sanitised before being\nused in SQL queries. This can be exploited to manipulate SQL queries\nby injecting arbitrary SQL code. \n\nSuccessful exploitation e.g. allows retrieval of administrator\nusernames and password hashes, but requires that \"register_globals\"\nis enabled, \"magic_quotes_gpc\" is disabled, and the attacker knows\nthe prefix for the database tables. \n\nThe vulnerability is confirmed in version 7.9. \n\nSOLUTION:\nEdit the source code to ensure that input is properly sanitised. \n\nUse another product. \n\nPROVIDED AND/OR DISCOVERED BY:\nPaisterist\n\nORIGINAL ADVISORY:\nhttp://www.neosecurityteam.net/advisories/PHP-Nuke-7.9-Old-Articles-Block-cat-SQL-Injection-vulnerability-31.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-0309" }, { "db": "JVNDB", "id": "JVNDB-2007-001393" }, { "db": "BID", "id": "22037" }, { "db": "VULHUB", "id": "VHN-23671" }, { "db": "PACKETSTORM", "id": "53739" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-23671", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-23671" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-0309", "trust": 2.5 }, { "db": "BID", "id": "22037", "trust": 2.0 }, { "db": "SECUNIA", "id": "23748", "trust": 1.8 }, { "db": "SREASON", "id": "2153", "trust": 1.7 }, { "db": "SECTRACK", "id": "1017511", "trust": 1.7 }, { "db": "OSVDB", "id": "32863", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2007-001393", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200701-250", "trust": 0.7 }, { "db": "XF", "id": "31482", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20070113 PHP-NUKE \u003c= 7.9 OLD-ARTICLES BLOCK \"CAT\" SQL INJECTION VULNERABILITY", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-82959", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "29453", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-23671", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "53739", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-23671" }, { "db": "BID", "id": "22037" }, { "db": "JVNDB", "id": "JVNDB-2007-001393" }, { "db": "PACKETSTORM", "id": "53739" }, { "db": "NVD", "id": "CVE-2007-0309" }, { "db": "CNNVD", "id": "CNNVD-200701-250" } ] }, "id": "VAR-200701-0166", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-23671" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:20:54.637000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://phpnuke.org/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001393" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-0309" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/22037" }, { "trust": 1.7, "url": "http://www.neosecurityteam.net/advisories/php-nuke--7.9-old-articles-block-cat-sql-injection-vulnerability-31.html" }, { "trust": 1.7, "url": "http://osvdb.org/32863" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1017511" }, { "trust": 1.7, "url": "http://secunia.com/advisories/23748" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/2153" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/456787/100/0/threaded" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31482" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0309" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0309" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/456787/100/0/threaded" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/31482" }, { "trust": 0.3, "url": "http://www.phpnuke.org" }, { "trust": 0.3, "url": "/archive/1/456787" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/software_inspector/" }, { "trust": 0.1, "url": "http://secunia.com/product/2385/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/23748/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://www.neosecurityteam.net/advisories/php-nuke-7.9-old-articles-block-cat-sql-injection-vulnerability-31.html" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-23671" }, { "db": "BID", "id": "22037" }, { "db": "JVNDB", "id": "JVNDB-2007-001393" }, { "db": "PACKETSTORM", "id": "53739" }, { "db": "NVD", "id": "CVE-2007-0309" }, { "db": "CNNVD", "id": "CNNVD-200701-250" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-23671" }, { "db": "BID", "id": "22037" }, { "db": "JVNDB", "id": "JVNDB-2007-001393" }, { "db": "PACKETSTORM", "id": "53739" }, { "db": "NVD", "id": "CVE-2007-0309" }, { "db": "CNNVD", "id": "CNNVD-200701-250" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-01-18T00:00:00", "db": "VULHUB", "id": "VHN-23671" }, { "date": "2007-01-13T00:00:00", "db": "BID", "id": "22037" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-001393" }, { "date": "2007-01-18T08:44:32", "db": "PACKETSTORM", "id": "53739" }, { "date": "2007-01-18T00:28:00", "db": "NVD", "id": "CVE-2007-0309" }, { "date": "2007-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-200701-250" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-16T00:00:00", "db": "VULHUB", "id": "VHN-23671" }, { "date": "2007-01-15T18:20:00", "db": "BID", "id": "22037" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-001393" }, { "date": "2018-10-16T16:32:12.870000", "db": "NVD", "id": "CVE-2007-0309" }, { "date": "2007-01-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200701-250" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200701-250" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Francisco Burzi PHP-Nuke of blocks/block-Old_Articles.php In SQL Injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001393" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "sql injection", "sources": [ { "db": "PACKETSTORM", "id": "53739" }, { "db": "CNNVD", "id": "CNNVD-200701-250" } ], "trust": 0.7 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.