VAR-200908-0054
Vulnerability from variot - Updated: 2023-12-18 13:58Multiple buffer overflows in Rumpus before 6.0.1 allow remote attackers to (1) cause a denial of service (segmentation fault) via a long HTTP verb in the HTTP component; and allow remote authenticated users to execute arbitrary code via a long argument to the (2) MKD, (3) XMKD, (4) RMD, and other unspecified commands in the FTP component. Maxum Rumpus FTP Server is prone to a remote denial-of-service vulnerability. This issue allows remote attackers to crash affected servers, denying service to legitimate users. Maxum Rumpus is prone to a remote buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the affected application, possibly with root privileges. Failed exploit attempts will result in a denial-of-service condition. Versions prior to Rumpus 6.0.1 are vulnerable. ----------------------------------------------------------------------
Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list?
Click here to learn more: http://secunia.com/advisories/business_solutions/
TITLE: Rumpus Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA32892
VERIFY ADVISORY: http://secunia.com/advisories/32892/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From remote
SOFTWARE: Rumpus 6.x http://secunia.com/advisories/product/20643/
DESCRIPTION: Blue Moon Consulting has reported some vulnerabilities in Rumpus, which can be exploited by malicious people to cause a DoS (Denial of Service) and by malicious users to potentially compromise a vulnerable system.
1) An error in the HTTP service when processing overly long HTTP methods can be exploited to cause a crash.
2) A boundary error in the FTP service when processing arguments sent to the e.g. "MKD", "XMKD", "RMD" FTP commands can be exploited to cause a stack-based buffer overflow.
Successful exploitation of this vulnerability may allow execution of arbitrary code, but requires valid FTP credentials.
The vulnerabilities are reported in version 6.0.
SOLUTION: Update to version 6.0.1.
PROVIDED AND/OR DISCOVERED BY: Blue Moon Consulting
ORIGINAL ADVISORY: Blue Moon Consulting (BMSA 2008-09): http://lists.grok.org.uk/pipermail/full-disclosure/2008-December/066086.html
Maxum: http://www.maxum.com/Rumpus/News601.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200908-0054",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "rumpus",
"scope": "lte",
"trust": 1.0,
"vendor": "maxum",
"version": "6.0"
},
{
"model": "rumpus",
"scope": "lt",
"trust": 0.8,
"vendor": "maxum",
"version": "6.0.1"
},
{
"model": "rumpus ftp server",
"scope": "eq",
"trust": 0.6,
"vendor": "maxum",
"version": "6.0"
},
{
"model": "rumpus ftp server",
"scope": "ne",
"trust": 0.6,
"vendor": "maxum",
"version": "6.0.1"
},
{
"model": "rumpus",
"scope": "eq",
"trust": 0.6,
"vendor": "maxum",
"version": "6.0"
}
],
"sources": [
{
"db": "BID",
"id": "32560"
},
{
"db": "BID",
"id": "32558"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-004354"
},
{
"db": "NVD",
"id": "CVE-2008-7078"
},
{
"db": "CNNVD",
"id": "CNNVD-200908-397"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:maxum:rumpus:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2008-7078"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Blue Moon Consulting",
"sources": [
{
"db": "BID",
"id": "32560"
},
{
"db": "BID",
"id": "32558"
}
],
"trust": 0.6
},
"cve": "CVE-2008-7078",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2008-7078",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2008-7078",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-200908-397",
"trust": 0.6,
"value": "CRITICAL"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-004354"
},
{
"db": "NVD",
"id": "CVE-2008-7078"
},
{
"db": "CNNVD",
"id": "CNNVD-200908-397"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple buffer overflows in Rumpus before 6.0.1 allow remote attackers to (1) cause a denial of service (segmentation fault) via a long HTTP verb in the HTTP component; and allow remote authenticated users to execute arbitrary code via a long argument to the (2) MKD, (3) XMKD, (4) RMD, and other unspecified commands in the FTP component. Maxum Rumpus FTP Server is prone to a remote denial-of-service vulnerability. \nThis issue allows remote attackers to crash affected servers, denying service to legitimate users. Maxum Rumpus is prone to a remote buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. \nAn attacker can exploit this issue to execute arbitrary code with the privileges of the user running the affected application, possibly with root privileges. Failed exploit attempts will result in a denial-of-service condition. \nVersions prior to Rumpus 6.0.1 are vulnerable. ----------------------------------------------------------------------\n\nDid you know that a change in our assessment rating, exploit code\navailability, or if an updated patch is released by the vendor, is\nnot part of this mailing-list?\n\nClick here to learn more:\nhttp://secunia.com/advisories/business_solutions/\n\n----------------------------------------------------------------------\n\nTITLE:\nRumpus Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA32892\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/32892/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nRumpus 6.x\nhttp://secunia.com/advisories/product/20643/\n\nDESCRIPTION:\nBlue Moon Consulting has reported some vulnerabilities in Rumpus,\nwhich can be exploited by malicious people to cause a DoS (Denial of\nService) and by malicious users to potentially compromise a\nvulnerable system. \n\n1) An error in the HTTP service when processing overly long HTTP\nmethods can be exploited to cause a crash. \n\n2) A boundary error in the FTP service when processing arguments sent\nto the e.g. \"MKD\", \"XMKD\", \"RMD\" FTP commands can be exploited to\ncause a stack-based buffer overflow. \n\nSuccessful exploitation of this vulnerability may allow execution of\narbitrary code, but requires valid FTP credentials. \n\nThe vulnerabilities are reported in version 6.0. \n\nSOLUTION:\nUpdate to version 6.0.1. \n\nPROVIDED AND/OR DISCOVERED BY:\nBlue Moon Consulting\n\nORIGINAL ADVISORY:\nBlue Moon Consulting (BMSA 2008-09):\nhttp://lists.grok.org.uk/pipermail/full-disclosure/2008-December/066086.html\n\nMaxum:\nhttp://www.maxum.com/Rumpus/News601.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2008-7078"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-004354"
},
{
"db": "BID",
"id": "32560"
},
{
"db": "BID",
"id": "32558"
},
{
"db": "PACKETSTORM",
"id": "72552"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2008-7078",
"trust": 2.4
},
{
"db": "BID",
"id": "32560",
"trust": 1.9
},
{
"db": "BID",
"id": "32558",
"trust": 1.9
},
{
"db": "SECUNIA",
"id": "32892",
"trust": 1.7
},
{
"db": "EXPLOIT-DB",
"id": "7314",
"trust": 1.6
},
{
"db": "JVNDB",
"id": "JVNDB-2009-004354",
"trust": 0.8
},
{
"db": "FULLDISC",
"id": "20081201 [BMSA 2008-09] TWO BUFFER OVERFLOW VULNERABILITIES IN RUMPUS V6.0",
"trust": 0.6
},
{
"db": "XF",
"id": "46987",
"trust": 0.6
},
{
"db": "XF",
"id": "46988",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20081201 [BMSA 2008-09] TWO BUFFER OVERFLOW VULNERABILITIES IN RUMPUS V6.0",
"trust": 0.6
},
{
"db": "MILW0RM",
"id": "7314",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200908-397",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "72552",
"trust": 0.1
}
],
"sources": [
{
"db": "BID",
"id": "32560"
},
{
"db": "BID",
"id": "32558"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-004354"
},
{
"db": "PACKETSTORM",
"id": "72552"
},
{
"db": "NVD",
"id": "CVE-2008-7078"
},
{
"db": "CNNVD",
"id": "CNNVD-200908-397"
}
]
},
"id": "VAR-200908-0054",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.5608974
},
"last_update_date": "2023-12-18T13:58:04.595000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Rumpus",
"trust": 0.8,
"url": "http://www.maxum.com/rumpus/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-004354"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-004354"
},
{
"db": "NVD",
"id": "CVE-2008-7078"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.maxum.com/rumpus/news601.html"
},
{
"trust": 1.6,
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-12/0007.html"
},
{
"trust": 1.6,
"url": "http://secunia.com/advisories/32892"
},
{
"trust": 1.6,
"url": "http://www.securityfocus.com/bid/32558"
},
{
"trust": 1.6,
"url": "http://www.securityfocus.com/bid/32560"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/archive/1/498786/100/0/threaded"
},
{
"trust": 1.0,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46987"
},
{
"trust": 1.0,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46988"
},
{
"trust": 1.0,
"url": "https://www.exploit-db.com/exploits/7314"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-7078"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-7078"
},
{
"trust": 0.6,
"url": "http://www.maxum.com/rumpus/"
},
{
"trust": 0.6,
"url": "/archive/1/498786"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/46988"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/46987"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/498786/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.milw0rm.com/exploits/7314"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/32892/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/business_solutions/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/product/20643/"
},
{
"trust": 0.1,
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-december/066086.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "BID",
"id": "32560"
},
{
"db": "BID",
"id": "32558"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-004354"
},
{
"db": "PACKETSTORM",
"id": "72552"
},
{
"db": "NVD",
"id": "CVE-2008-7078"
},
{
"db": "CNNVD",
"id": "CNNVD-200908-397"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "32560"
},
{
"db": "BID",
"id": "32558"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-004354"
},
{
"db": "PACKETSTORM",
"id": "72552"
},
{
"db": "NVD",
"id": "CVE-2008-7078"
},
{
"db": "CNNVD",
"id": "CNNVD-200908-397"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2008-12-01T00:00:00",
"db": "BID",
"id": "32560"
},
{
"date": "2008-12-01T00:00:00",
"db": "BID",
"id": "32558"
},
{
"date": "2012-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-004354"
},
{
"date": "2008-12-02T17:24:32",
"db": "PACKETSTORM",
"id": "72552"
},
{
"date": "2009-08-25T10:30:00.627000",
"db": "NVD",
"id": "CVE-2008-7078"
},
{
"date": "2008-12-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200908-397"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2008-12-01T23:53:00",
"db": "BID",
"id": "32560"
},
{
"date": "2008-12-01T23:53:00",
"db": "BID",
"id": "32558"
},
{
"date": "2012-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-004354"
},
{
"date": "2018-10-11T20:58:13.503000",
"db": "NVD",
"id": "CVE-2008-7078"
},
{
"date": "2009-08-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200908-397"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "32560"
},
{
"db": "BID",
"id": "32558"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rumpus Vulnerable to buffer overflow",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-004354"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Boundary Condition Error",
"sources": [
{
"db": "BID",
"id": "32560"
},
{
"db": "BID",
"id": "32558"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.