VAR-201402-0347
Vulnerability from variot - Updated: 2023-12-18 12:08Rockwell Automation RSLogix 5000 7 through 20.01, and 21.0, does not properly implement password protection for .ACD files (aka project files), which allows local users to obtain sensitive information or modify data via unspecified vectors. Rockwell Automation is a provider of industrial automation, control and information technology solutions. An attacker can exploit this issue to compromise user defined passwords. This results in unauthorized access and may lead to further attacks. RSLogix 5000 versions 7.0 through 20.01 and V21.0 are vulnerable. The software provides high-performance integrated control systems for manufacturers and machine builders who need medium-sized control systems, and also provides a unified development environment for Rockwell Automation Integrated Architecture systems. A security bypass vulnerability exists in Rockwell Automation RSLogix 5000 versions 7 through 20.01 and 21.0 due to the program not properly password-protecting the '.ACD' file
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201402-0347",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "rslogix 5000 design and configuration software",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "18.0"
},
{
"model": "rslogix 5000 design and configuration software",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "21.0"
},
{
"model": "rslogix 5000 design and configuration software",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "7.0"
},
{
"model": "rslogix 5000 design and configuration software",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "20.01"
},
{
"model": "logix5000 controller",
"scope": null,
"trust": 0.8,
"vendor": "rockwell automation",
"version": null
},
{
"model": "rslogix 5000",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "21.0"
},
{
"model": "rslogix 5000",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "7.0 to 20.01"
},
{
"model": "software automation rslogix",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "50007-20.01"
},
{
"model": "software automation rslogix",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "500021.0"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "500021.0"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "500020.01"
},
{
"model": "automation rslogix",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "500021.03"
},
{
"model": "automation rslogix",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "500020.03"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "rslogix 5000 design and configuration",
"version": "7.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "rslogix 5000 design and configuration",
"version": "18.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "rslogix 5000 design and configuration",
"version": "20.01"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "rslogix 5000 design and configuration",
"version": "21.0"
}
],
"sources": [
{
"db": "IVD",
"id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-00720"
},
{
"db": "BID",
"id": "65337"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001314"
},
{
"db": "NVD",
"id": "CVE-2014-0755"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-036"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:rslogix_5000_design_and_configuration_software:20.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:rslogix_5000_design_and_configuration_software:21.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:rslogix_5000_design_and_configuration_software:18.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:rslogix_5000_design_and_configuration_software:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rockwellautomation:logix_5000_controller:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-0755"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stephen Dunlap",
"sources": [
{
"db": "BID",
"id": "65337"
}
],
"trust": 0.3
},
"cve": "CVE-2014-0755",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.4,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Local",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 6.9,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2014-0755",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.4,
"id": "CNVD-2014-00720",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.4,
"id": "3dbe138e-2352-11e6-abef-000c29c66e3d",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.4,
"id": "VHN-68248",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-0755",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2014-00720",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201402-036",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "3dbe138e-2352-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-68248",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-00720"
},
{
"db": "VULHUB",
"id": "VHN-68248"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001314"
},
{
"db": "NVD",
"id": "CVE-2014-0755"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-036"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rockwell Automation RSLogix 5000 7 through 20.01, and 21.0, does not properly implement password protection for .ACD files (aka project files), which allows local users to obtain sensitive information or modify data via unspecified vectors. Rockwell Automation is a provider of industrial automation, control and information technology solutions. \nAn attacker can exploit this issue to compromise user defined passwords. This results in unauthorized access and may lead to further attacks. \nRSLogix 5000 versions 7.0 through 20.01 and V21.0 are vulnerable. The software provides high-performance integrated control systems for manufacturers and machine builders who need medium-sized control systems, and also provides a unified development environment for Rockwell Automation Integrated Architecture systems. A security bypass vulnerability exists in Rockwell Automation RSLogix 5000 versions 7 through 20.01 and 21.0 due to the program not properly password-protecting the \u0027.ACD\u0027 file",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-0755"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001314"
},
{
"db": "CNVD",
"id": "CNVD-2014-00720"
},
{
"db": "BID",
"id": "65337"
},
{
"db": "IVD",
"id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-68248"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-0755",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-14-021-01",
"trust": 3.4
},
{
"db": "BID",
"id": "65337",
"trust": 2.0
},
{
"db": "OSVDB",
"id": "102858",
"trust": 1.1
},
{
"db": "CNNVD",
"id": "CNNVD-201402-036",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2014-00720",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001314",
"trust": 0.8
},
{
"db": "IVD",
"id": "3DBE138E-2352-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-68248",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-00720"
},
{
"db": "VULHUB",
"id": "VHN-68248"
},
{
"db": "BID",
"id": "65337"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001314"
},
{
"db": "NVD",
"id": "CVE-2014-0755"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-036"
}
]
},
"id": "VAR-201402-0347",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-00720"
},
{
"db": "VULHUB",
"id": "VHN-68248"
}
],
"trust": 1.775
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-00720"
}
]
},
"last_update_date": "2023-12-18T12:08:51.605000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.rockwellautomation.com/"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "http://jp.rockwellautomation.com/"
},
{
"title": "Rockwell Automation RSLogix 5000 Security Bypass Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/43439"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00720"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001314"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-255",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-68248"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001314"
},
{
"db": "NVD",
"id": "CVE-2014-0755"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-14-021-01"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/65337"
},
{
"trust": 1.1,
"url": "http://osvdb.org/102858"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90981"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0755"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0755"
},
{
"trust": 0.3,
"url": "http://www.rockwellautomation.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00720"
},
{
"db": "VULHUB",
"id": "VHN-68248"
},
{
"db": "BID",
"id": "65337"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001314"
},
{
"db": "NVD",
"id": "CVE-2014-0755"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-036"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-00720"
},
{
"db": "VULHUB",
"id": "VHN-68248"
},
{
"db": "BID",
"id": "65337"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001314"
},
{
"db": "NVD",
"id": "CVE-2014-0755"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-036"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-02-12T00:00:00",
"db": "IVD",
"id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
},
{
"date": "2014-02-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-00720"
},
{
"date": "2014-02-05T00:00:00",
"db": "VULHUB",
"id": "VHN-68248"
},
{
"date": "2014-02-04T00:00:00",
"db": "BID",
"id": "65337"
},
{
"date": "2014-02-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-001314"
},
{
"date": "2014-02-05T05:15:29.930000",
"db": "NVD",
"id": "CVE-2014-0755"
},
{
"date": "2014-02-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201402-036"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-02-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-00720"
},
{
"date": "2017-08-29T00:00:00",
"db": "VULHUB",
"id": "VHN-68248"
},
{
"date": "2014-02-04T00:00:00",
"db": "BID",
"id": "65337"
},
{
"date": "2014-02-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-001314"
},
{
"date": "2017-08-29T01:34:15.327000",
"db": "NVD",
"id": "CVE-2014-0755"
},
{
"date": "2014-02-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201402-036"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "65337"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-036"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rockwell Automation RSLogix 5000 Security Bypass Vulnerability",
"sources": [
{
"db": "IVD",
"id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-00720"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-036"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Trust management",
"sources": [
{
"db": "IVD",
"id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-036"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.