var-201001-0738
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in +CSCOT+/translation in Cisco Secure Desktop 3.4.2048, and other versions before 3.5; as used in Cisco ASA appliance before 8.2(1), 8.1(2.7), and 8.0(5); allows remote attackers to inject arbitrary web script or HTML via a crafted POST parameter, which is not properly handled by an eval statement in binary/mainv.js that writes to start.html. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Versions prior to Cisco Secure Desktop 3.5 are vulnerable. Cisco Secure Desktop (CSD) uses encryption to reduce the risk of cookies, browser history, temporary files, and downloads being left on the system after a remote user logs off or an SSL VPN session times out.
Input passed via a POST request to the "/translation" script of the web interface is not properly sanitised before being returned to the user.
Cisco ASA 5500 Series Adaptive Security Appliances: Update to version 8.2(1), 8.1(2.7), or 8.0(5)
PROVIDED AND/OR DISCOVERED BY: Matias Pablo Brutti, Core Security Technologies
ORIGINAL ADVISORY: Cisco: http://tools.cisco.com/security/center/viewAlert.x?alertId=19843
Core Security Technologies: http://www.coresecurity.com/content/cisco-secure-desktop-xss
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201001-0738", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "secure desktop", "scope": "lt", "trust": 1.8, "vendor": "cisco", "version": "3.5" }, { "model": "secure desktop", "scope": "eq", "trust": 1.1, "vendor": "cisco", "version": "3.4.2048" }, { "model": "adaptive security appliance software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "8.0" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "8.1\\(2.7\\)" }, { "model": "adaptive security appliance software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "8.2" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "8.2\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "8.1" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "8.0\\(5\\)" }, { "model": "secure desktop", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "3.1.1" }, { "model": "secure desktop", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "3.1.1.33" }, { "model": "secure desktop", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "3.1" }, { "model": "adaptive security appliance", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.0(5)" }, { "model": "adaptive security appliance", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.1(2.7)" }, { "model": "adaptive security appliance", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.2(1)" }, { "model": "secure desktop", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "3.4" }, { "model": "secure desktop", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "3.4.2" }, { "model": "secure desktop", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "3.3" }, { "model": "secure desktop", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "3.2.1" }, { "model": "secure desktop", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "3.1.1.27" }, { "model": "secure desktop", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "3.4.1" }, { "model": "secure desktop", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "3.2" }, { "model": "secure desktop", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1.1.45" }, { "model": "secure desktop", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.5.841" } ], "sources": [ { "db": "BID", "id": "37960" }, { "db": "JVNDB", "id": "JVNDB-2010-001084" }, { "db": "NVD", "id": "CVE-2010-0440" }, { "db": "CNNVD", "id": "CNNVD-201002-022" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:secure_desktop:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.1\\(2.7\\)", "versionStartIncluding": "8.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.0\\(5\\)", "versionStartIncluding": "8.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.2\\(1\\)", "versionStartIncluding": "8.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:asa_5500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0440" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Matias Pablo Brutti", "sources": [ { "db": "CNNVD", "id": "CNNVD-201002-022" } ], "trust": 0.6 }, "cve": "CVE-2010-0440", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2010-0440", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-43045", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2010-0440", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201002-022", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-43045", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-43045" }, { "db": "JVNDB", "id": "JVNDB-2010-001084" }, { "db": "NVD", "id": "CVE-2010-0440" }, { "db": "CNNVD", "id": "CNNVD-201002-022" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in +CSCOT+/translation in Cisco Secure Desktop 3.4.2048, and other versions before 3.5; as used in Cisco ASA appliance before 8.2(1), 8.1(2.7), and 8.0(5); allows remote attackers to inject arbitrary web script or HTML via a crafted POST parameter, which is not properly handled by an eval statement in binary/mainv.js that writes to start.html. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. \nVersions prior to Cisco Secure Desktop 3.5 are vulnerable. Cisco Secure Desktop (CSD) uses encryption to reduce the risk of cookies, browser history, temporary files, and downloads being left on the system after a remote user logs off or an SSL VPN session times out. \n\nInput passed via a POST request to the \"/translation\" script of the\nweb interface is not properly sanitised before being returned to the\nuser. \n\nCisco ASA 5500 Series Adaptive Security Appliances:\nUpdate to version 8.2(1), 8.1(2.7), or 8.0(5)\n\nPROVIDED AND/OR DISCOVERED BY:\nMatias Pablo Brutti, Core Security Technologies\n\nORIGINAL ADVISORY:\nCisco:\nhttp://tools.cisco.com/security/center/viewAlert.x?alertId=19843\n\nCore Security Technologies:\nhttp://www.coresecurity.com/content/cisco-secure-desktop-xss\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2010-0440" }, { "db": "JVNDB", "id": "JVNDB-2010-001084" }, { "db": "BID", "id": "37960" }, { "db": "VULHUB", "id": "VHN-43045" }, { "db": "PACKETSTORM", "id": "85865" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-43045", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-43045" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "37960", "trust": 2.8 }, { "db": "NVD", "id": "CVE-2010-0440", "trust": 2.8 }, { "db": "SECUNIA", "id": "38397", "trust": 2.6 }, { "db": "VUPEN", "id": "ADV-2010-0273", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2010-001084", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201002-022", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20100201 [CORE-2010-0106] CISCO SECURE DESKTOP XSS/JAVASCRIPT INJECTION", "trust": 0.6 }, { "db": "NSFOCUS", "id": "14441", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "85827", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-86775", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "33567", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-43045", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "85865", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-43045" }, { "db": "BID", "id": "37960" }, { "db": "JVNDB", "id": "JVNDB-2010-001084" }, { "db": "PACKETSTORM", "id": "85865" }, { "db": "NVD", "id": "CVE-2010-0440" }, { "db": "CNNVD", "id": "CNNVD-201002-022" } ] }, "id": "VAR-201001-0738", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-43045" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:44:49.460000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "19843", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=19843" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001084" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-43045" }, { "db": "JVNDB", "id": "JVNDB-2010-001084" }, { "db": "NVD", "id": "CVE-2010-0440" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/37960" }, { "trust": 2.5, "url": "http://secunia.com/advisories/38397" }, { "trust": 2.5, "url": "http://www.vupen.com/english/advisories/2010/0273" }, { "trust": 2.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=19843" }, { "trust": 2.1, "url": "http://www.coresecurity.com/content/cisco-secure-desktop-xss" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/509290/100/0/threaded" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0440" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0440" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/509290/100/0/threaded" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/14441" }, { "trust": 0.3, "url": "http://www.cisco.com" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/blog/71/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/38397/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-43045" }, { "db": "BID", "id": "37960" }, { "db": "JVNDB", "id": "JVNDB-2010-001084" }, { "db": "PACKETSTORM", "id": "85865" }, { "db": "NVD", "id": "CVE-2010-0440" }, { "db": "CNNVD", "id": "CNNVD-201002-022" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-43045" }, { "db": "BID", "id": "37960" }, { "db": "JVNDB", "id": "JVNDB-2010-001084" }, { "db": "PACKETSTORM", "id": "85865" }, { "db": "NVD", "id": "CVE-2010-0440" }, { "db": "CNNVD", "id": "CNNVD-201002-022" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-02-03T00:00:00", "db": "VULHUB", "id": "VHN-43045" }, { "date": "2010-01-26T00:00:00", "db": "BID", "id": "37960" }, { "date": "2010-02-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001084" }, { "date": "2010-02-02T17:26:28", "db": "PACKETSTORM", "id": "85865" }, { "date": "2010-02-03T18:30:00.813000", "db": "NVD", "id": "CVE-2010-0440" }, { "date": "2010-01-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201002-022" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-11-15T00:00:00", "db": "VULHUB", "id": "VHN-43045" }, { "date": "2010-01-26T00:00:00", "db": "BID", "id": "37960" }, { "date": "2010-02-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001084" }, { "date": "2023-08-11T19:03:30.373000", "db": "NVD", "id": "CVE-2010-0440" }, { "date": "2010-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201002-022" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201002-022" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Secure Desktop of +CSCOT+/translation Vulnerable to cross-site scripting", "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001084" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xss", "sources": [ { "db": "PACKETSTORM", "id": "85865" }, { "db": "CNNVD", "id": "CNNVD-201002-022" } ], "trust": 0.7 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.