VAR-201005-0178
Vulnerability from variot - Updated: 2023-12-18 10:50Use-after-free vulnerability in Apple Safari 4.0.5 on Windows allows remote attackers to execute arbitrary code by using window.open to create a popup window for a crafted HTML document, and then calling the parent window's close method, which triggers improper handling of a deleted window object. Apple Safari Is window A vulnerability exists that does not correctly handle references to objects. Apple Safari Then window With a reference to the object remaining, window It is possible to delete objects. JavaScript Removed from window An illegal pointer reference occurs when using an object. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. NOTE: To successfully exploit this issue, the browser pop-up blocker needs to be disabled. The pop-up blocker in Safari is enabled by default. Apple Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. ----------------------------------------------------------------------
Looking for a job?
Secunia is hiring skilled researchers and talented developers.
The vulnerability is caused due to an error in the handling of parent windows and can result in a function call using an invalid pointer. This can be exploited to execute arbitrary code when a user e.g. visits a specially crafted web page and closes opened pop-up windows. Other versions may also be affected.
SOLUTION: Do not visit untrusted web sites or follow links from untrusted sources.
PROVIDED AND/OR DISCOVERED BY: Krystian Kloskowski (h07)
ORIGINAL ADVISORY: http://h07.w.interia.pl/Safari.rar
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201005-0178",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "safari",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "4.0.5"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "apple",
"version": null
},
{
"model": "safari",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "4.0.5 for windows"
},
{
"model": "safari for windows",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.0.5"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#943165"
},
{
"db": "BID",
"id": "39990"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001496"
},
{
"db": "NVD",
"id": "CVE-2010-1939"
},
{
"db": "CNNVD",
"id": "CNNVD-201005-215"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2010-1939"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Krystian Kloskowski h07@interia.pl",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201005-215"
}
],
"trust": 0.6
},
"cve": "CVE-2010-1939",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 4.9,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "High",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.6,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2010-1939",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 4.9,
"id": "VHN-44544",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:H/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2010-1939",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#943165",
"trust": 0.8,
"value": "20.41"
},
{
"author": "CNNVD",
"id": "CNNVD-201005-215",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-44544",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#943165"
},
{
"db": "VULHUB",
"id": "VHN-44544"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001496"
},
{
"db": "NVD",
"id": "CVE-2010-1939"
},
{
"db": "CNNVD",
"id": "CNNVD-201005-215"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Use-after-free vulnerability in Apple Safari 4.0.5 on Windows allows remote attackers to execute arbitrary code by using window.open to create a popup window for a crafted HTML document, and then calling the parent window\u0027s close method, which triggers improper handling of a deleted window object. Apple Safari Is window A vulnerability exists that does not correctly handle references to objects. Apple Safari Then window With a reference to the object remaining, window It is possible to delete objects. JavaScript Removed from window An illegal pointer reference occurs when using an object. \nSuccessful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. \nNOTE: To successfully exploit this issue, the browser pop-up blocker needs to be disabled. The pop-up blocker in Safari is enabled by default. Apple Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. ----------------------------------------------------------------------\n\n\nLooking for a job?\n\n\nSecunia is hiring skilled researchers and talented developers. \n\nThe vulnerability is caused due to an error in the handling of parent\nwindows and can result in a function call using an invalid pointer. \nThis can be exploited to execute arbitrary code when a user e.g. \nvisits a specially crafted web page and closes opened pop-up\nwindows. \nOther versions may also be affected. \n\nSOLUTION:\nDo not visit untrusted web sites or follow links from untrusted\nsources. \n\nPROVIDED AND/OR DISCOVERED BY:\nKrystian Kloskowski (h07)\n\nORIGINAL ADVISORY:\nhttp://h07.w.interia.pl/Safari.rar\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2010-1939"
},
{
"db": "CERT/CC",
"id": "VU#943165"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001496"
},
{
"db": "BID",
"id": "39990"
},
{
"db": "VULHUB",
"id": "VHN-44544"
},
{
"db": "PACKETSTORM",
"id": "89292"
}
],
"trust": 2.79
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-44544",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-44544"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#943165",
"trust": 3.6
},
{
"db": "NVD",
"id": "CVE-2010-1939",
"trust": 2.8
},
{
"db": "BID",
"id": "39990",
"trust": 2.8
},
{
"db": "SECUNIA",
"id": "39670",
"trust": 2.6
},
{
"db": "VUPEN",
"id": "ADV-2010-1097",
"trust": 2.5
},
{
"db": "SECTRACK",
"id": "1023958",
"trust": 2.5
},
{
"db": "OSVDB",
"id": "64482",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001496",
"trust": 0.8
},
{
"db": "NSFOCUS",
"id": "14982",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201005-215",
"trust": 0.6
},
{
"db": "EXPLOIT-DB",
"id": "12573",
"trust": 0.1
},
{
"db": "EXPLOIT-DB",
"id": "12614",
"trust": 0.1
},
{
"db": "SEEBUG",
"id": "SSVID-68618",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-44544",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "89292",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#943165"
},
{
"db": "VULHUB",
"id": "VHN-44544"
},
{
"db": "BID",
"id": "39990"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001496"
},
{
"db": "PACKETSTORM",
"id": "89292"
},
{
"db": "NVD",
"id": "CVE-2010-1939"
},
{
"db": "CNNVD",
"id": "CNNVD-201005-215"
}
]
},
"id": "VAR-201005-0178",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-44544"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T10:50:35.401000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "HT4196",
"trust": 0.8,
"url": "http://support.apple.com/kb/ht4196"
},
{
"title": "HT4196",
"trust": 0.8,
"url": "http://support.apple.com/kb/ht4196?viewlocale=ja_jp"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2010-001496"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-44544"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001496"
},
{
"db": "NVD",
"id": "CVE-2010-1939"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "http://www.kb.cert.org/vuls/id/943165"
},
{
"trust": 2.5,
"url": "http://www.securityfocus.com/bid/39990"
},
{
"trust": 2.5,
"url": "http://securitytracker.com/id?1023958"
},
{
"trust": 2.5,
"url": "http://secunia.com/advisories/39670"
},
{
"trust": 2.5,
"url": "http://www.vupen.com/english/advisories/2010/1097"
},
{
"trust": 1.8,
"url": "http://h07.w.interia.pl/safari.rar"
},
{
"trust": 1.7,
"url": "http://reviews.cnet.com/8301-13727_7-20004709-263.html"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/64482"
},
{
"trust": 1.1,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6748"
},
{
"trust": 0.8,
"url": "about vulnerability notes"
},
{
"trust": 0.8,
"url": "contact us about this vulnerability"
},
{
"trust": 0.8,
"url": "provide a vendor statement"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1939"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu943165"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1939"
},
{
"trust": 0.8,
"url": "http://osvdb.org/64482"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/14982"
},
{
"trust": 0.3,
"url": "http://www.apple.com/safari/"
},
{
"trust": 0.1,
"url": "http://secunia.com/company/jobs/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/39670/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#943165"
},
{
"db": "VULHUB",
"id": "VHN-44544"
},
{
"db": "BID",
"id": "39990"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001496"
},
{
"db": "PACKETSTORM",
"id": "89292"
},
{
"db": "NVD",
"id": "CVE-2010-1939"
},
{
"db": "CNNVD",
"id": "CNNVD-201005-215"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#943165"
},
{
"db": "VULHUB",
"id": "VHN-44544"
},
{
"db": "BID",
"id": "39990"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001496"
},
{
"db": "PACKETSTORM",
"id": "89292"
},
{
"db": "NVD",
"id": "CVE-2010-1939"
},
{
"db": "CNNVD",
"id": "CNNVD-201005-215"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-05-10T00:00:00",
"db": "CERT/CC",
"id": "VU#943165"
},
{
"date": "2010-05-13T00:00:00",
"db": "VULHUB",
"id": "VHN-44544"
},
{
"date": "2010-05-07T00:00:00",
"db": "BID",
"id": "39990"
},
{
"date": "2010-06-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2010-001496"
},
{
"date": "2010-05-08T08:39:48",
"db": "PACKETSTORM",
"id": "89292"
},
{
"date": "2010-05-13T22:30:00.983000",
"db": "NVD",
"id": "CVE-2010-1939"
},
{
"date": "2010-05-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201005-215"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-07-27T00:00:00",
"db": "CERT/CC",
"id": "VU#943165"
},
{
"date": "2017-09-19T00:00:00",
"db": "VULHUB",
"id": "VHN-44544"
},
{
"date": "2015-04-13T21:02:00",
"db": "BID",
"id": "39990"
},
{
"date": "2010-08-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2010-001496"
},
{
"date": "2017-09-19T01:30:53.893000",
"db": "NVD",
"id": "CVE-2010-1939"
},
{
"date": "2010-05-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201005-215"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201005-215"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple Safari window object invalid pointer vulnerability",
"sources": [
{
"db": "CERT/CC",
"id": "VU#943165"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201005-215"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.