var-201401-0365
Vulnerability from variot
Directory traversal vulnerability in CimWebServer.exe (aka the WebView component) in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY before 8.2 SIM 24, and Proficy Process Systems with CIMPLICITY, allows remote attackers to execute arbitrary code via a crafted message to TCP port 10212, aka ZDI-CAN-1623. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CimWebServer component. This component performs insufficient parameter validation on the szScreen field. Successful exploitation will allow an attacker to upload and execute an arbitrary file on the target server. GE Proficy CIMPLICITY is a monitoring software developed by GE and one of the industry's leading HMI/SCADA software. GE Proficy CIMPLICITY's CimWebServer based on WEB access fails to properly check the location of shell files loaded into the system. By modifying the source location, an attacker can send shell code to CimWebServer and deploy it to any SCADA project and execute it with WEB privileges. The following products are affected: Proficy HMI/SCADA - CIMPLICITY 4.01 through versions 8.2 Proficy Process Systems with CIMPLICITY
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201401-0365", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "intelligent platforms proficy hmi\\/scada cimplicity", "scope": "eq", "trust": 1.6, "vendor": "ge", "version": "8.2" }, { "model": "intelligent platforms proficy hmi\\/scada cimplicity", "scope": "eq", "trust": 1.6, "vendor": "ge", "version": "8.0" }, { "model": "intelligent platforms proficy process systems with cimplicity", "scope": "eq", "trust": 1.6, "vendor": "ge", "version": null }, { "model": "intelligent platforms proficy hmi\\/scada cimplicity", "scope": "eq", "trust": 1.6, "vendor": "ge", "version": "7.5" }, { "model": "intelligent platforms proficy hmi\\/scada cimplicity", "scope": "eq", "trust": 1.6, "vendor": "ge", "version": "8.1" }, { "model": "intelligent platforms proficy hmi\\/scada cimplicity", "scope": "eq", "trust": 1.6, "vendor": "ge", "version": "4.01" }, { "model": "intelligent platforms proficy hmi\\%2fscada cimplicity", "scope": "lte", "trust": 1.0, "vendor": "ge", "version": "8.2" }, { "model": "proficy hmi/scada - cimplicity", "scope": "eq", "trust": 0.8, "vendor": "general electric", "version": "4.01 to 8.2" }, { "model": "proficy process systems with cimplicity", "scope": null, "trust": 0.8, "vendor": "general electric", "version": null }, { "model": "proficy cimplicity", "scope": null, "trust": 0.7, "vendor": "ge", "version": null }, { "model": "electric proficy process systems with cimplicity", "scope": null, "trust": 0.6, "vendor": "general", "version": null }, { "model": "electric proficy hmi/scada \\342\\200\\223 cimplicity", "scope": "eq", "trust": 0.6, "vendor": "general", "version": "4.01-8.2" }, { "model": "intelligent platforms proficy hmi\\%2fscada cimplicity", "scope": "eq", "trust": 0.6, "vendor": "ge", "version": "8.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "intelligent platforms proficy hmi 2fscada cimplicity", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "intelligent platforms proficy hmi scada cimplicity", "version": "4.01" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "intelligent platforms proficy hmi scada cimplicity", "version": "7.5" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "intelligent platforms proficy hmi scada cimplicity", "version": "8.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "intelligent platforms proficy hmi scada cimplicity", "version": "8.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "intelligent platforms proficy hmi scada cimplicity", "version": "8.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "intelligent platforms proficy process with cimplicity", "version": null } ], "sources": [ { "db": "IVD", "id": "4369d8b8-2352-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-14-016" }, { "db": "CNVD", "id": "CNVD-2014-00675" }, { "db": "JVNDB", "id": "JVNDB-2014-001258" }, { "db": "NVD", "id": "CVE-2014-0751" }, { "db": "CNNVD", "id": "CNNVD-201401-524" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\\/scada_cimplicity:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\\/scada_cimplicity:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\\/scada_cimplicity:4.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\\%2fscada_cimplicity:*:sim24:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\\/scada_cimplicity:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\\/scada_cimplicity:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ge:intelligent_platforms_proficy_process_systems_with_cimplicity:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-0751" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZombiE and amisto0x07", "sources": [ { "db": "ZDI", "id": "ZDI-14-016" } ], "trust": 0.7 }, "cve": "CVE-2014-0751", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-0751", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2014-0751", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2014-00675", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "4369d8b8-2352-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-0751", "trust": 1.8, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2014-0751", "trust": 0.7, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2014-00675", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201401-524", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "4369d8b8-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "4369d8b8-2352-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-14-016" }, { "db": "CNVD", "id": "CNVD-2014-00675" }, { "db": "JVNDB", "id": "JVNDB-2014-001258" }, { "db": "NVD", "id": "CVE-2014-0751" }, { "db": "CNNVD", "id": "CNNVD-201401-524" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Directory traversal vulnerability in CimWebServer.exe (aka the WebView component) in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY before 8.2 SIM 24, and Proficy Process Systems with CIMPLICITY, allows remote attackers to execute arbitrary code via a crafted message to TCP port 10212, aka ZDI-CAN-1623. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CimWebServer component. This component performs insufficient parameter validation on the szScreen field. Successful exploitation will allow an attacker to upload and execute an arbitrary file on the target server. GE Proficy CIMPLICITY is a monitoring software developed by GE and one of the industry\u0027s leading HMI/SCADA software. GE Proficy CIMPLICITY\u0027s CimWebServer based on WEB access fails to properly check the location of shell files loaded into the system. By modifying the source location, an attacker can send shell code to CimWebServer and deploy it to any SCADA project and execute it with WEB privileges. \nThe following products are affected:\nProficy HMI/SCADA - CIMPLICITY 4.01 through versions 8.2\nProficy Process Systems with CIMPLICITY", "sources": [ { "db": "NVD", "id": "CVE-2014-0751" }, { "db": "JVNDB", "id": "JVNDB-2014-001258" }, { "db": "ZDI", "id": "ZDI-14-016" }, { "db": "CNVD", "id": "CNVD-2014-00675" }, { "db": "BID", "id": "65117" }, { "db": "IVD", "id": "4369d8b8-2352-11e6-abef-000c29c66e3d" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-0751", "trust": 4.2 }, { "db": "ICS CERT", "id": "ICSA-14-023-01", "trust": 3.0 }, { "db": "BID", "id": "65117", "trust": 1.9 }, { "db": "CNVD", "id": "CNVD-2014-00675", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201401-524", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-001258", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1623", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-14-016", "trust": 0.7 }, { "db": "IVD", "id": "4369D8B8-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "4369d8b8-2352-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-14-016" }, { "db": "CNVD", "id": "CNVD-2014-00675" }, { "db": "BID", "id": "65117" }, { "db": "JVNDB", "id": "JVNDB-2014-001258" }, { "db": "NVD", "id": "CVE-2014-0751" }, { "db": "CNNVD", "id": "CNNVD-201401-524" } ] }, "id": "VAR-201401-0365", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "4369d8b8-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-00675" } ], "trust": 1.5099878000000002 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "4369d8b8-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-00675" } ] }, "last_update_date": "2023-12-18T13:03:38.738000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "KB15940", "trust": 0.8, "url": "http://support.ge-ip.com/support/index?page=kbchannel\u0026id=kb15940" }, { "title": "GE has issued an update to correct this vulnerability.", "trust": 0.7, "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-023-01" }, { "title": "Multiple General Electric product shell upload vulnerability patches", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/43199" } ], "sources": [ { "db": "ZDI", "id": "ZDI-14-016" }, { "db": "CNVD", "id": "CNVD-2014-00675" }, { "db": "JVNDB", "id": "JVNDB-2014-001258" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-001258" }, { "db": "NVD", "id": "CVE-2014-0751" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.7, "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-023-01" }, { "trust": 1.6, "url": "http://support.ge-ip.com/support/index?page=kbchannel\u0026id=kb15940" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/65117" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0751" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0751" } ], "sources": [ { "db": "ZDI", "id": "ZDI-14-016" }, { "db": "CNVD", "id": "CNVD-2014-00675" }, { "db": "JVNDB", "id": "JVNDB-2014-001258" }, { "db": "NVD", "id": "CVE-2014-0751" }, { "db": "CNNVD", "id": "CNNVD-201401-524" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "4369d8b8-2352-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-14-016" }, { "db": "CNVD", "id": "CNVD-2014-00675" }, { "db": "BID", "id": "65117" }, { "db": "JVNDB", "id": "JVNDB-2014-001258" }, { "db": "NVD", "id": "CVE-2014-0751" }, { "db": "CNNVD", "id": "CNNVD-201401-524" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-01-28T00:00:00", "db": "IVD", "id": "4369d8b8-2352-11e6-abef-000c29c66e3d" }, { "date": "2014-02-13T00:00:00", "db": "ZDI", "id": "ZDI-14-016" }, { "date": "2014-01-28T00:00:00", "db": "CNVD", "id": "CNVD-2014-00675" }, { "date": "2014-01-23T00:00:00", "db": "BID", "id": "65117" }, { "date": "2014-01-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-001258" }, { "date": "2014-01-25T22:55:04.583000", "db": "NVD", "id": "CVE-2014-0751" }, { "date": "2014-01-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201401-524" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-02-13T00:00:00", "db": "ZDI", "id": "ZDI-14-016" }, { "date": "2014-01-28T00:00:00", "db": "CNVD", "id": "CNVD-2014-00675" }, { "date": "2014-02-17T03:56:00", "db": "BID", "id": "65117" }, { "date": "2014-01-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-001258" }, { "date": "2014-02-21T05:06:26.877000", "db": "NVD", "id": "CVE-2014-0751" }, { "date": "2014-01-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201401-524" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201401-524" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY and Proficy Process Systems with CIMPLICITY Vulnerable to directory traversal", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-001258" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Path traversal", "sources": [ { "db": "IVD", "id": "4369d8b8-2352-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201401-524" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.