var-201502-0228
Vulnerability from variot
Stack-based buffer overflow in dsmtca in the client in IBM Tivoli Storage Manager (TSM) 5.4 through 5.4.3.6, 5.5 through 5.5.4.3, 6.1 through 6.1.5.6, 6.2 before 6.2.5.4, and 6.3 before 6.3.2.3 on UNIX, Linux, and OS X allows local users to gain privileges via unspecified vectors. Successful exploits may allow attackers to execute arbitrary code in the context of the application with root privileges. Failed exploits may result in denial-of-service conditions. IBM Tivoli Storage Manager (TSM) is a set of backup and recovery management solutions of IBM Corporation in the United States. The solution supports data protection, space management and archiving, business recovery and disaster recovery, etc. The dsmtca program in the IBM TSM client has a stack-based buffer overflow vulnerability. A local attacker could exploit this vulnerability to gain privileges. The following versions are affected: IBM TSM versions 5.4 through 5.4.3.6, 5.5 through 5.5.4.3, 6.1 through 6.1.5.6, 6.2.0.0 through 6.2.5.3 on UNIX, Linux and OS X platforms, Version 6.3.0.0 to version 6.3.2.2
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201502-0228", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tivoli storage manager", "scope": "gte", "trust": 1.0, "vendor": "ibm", "version": "6.2.0" }, { "model": "tivoli storage manager", "scope": "gte", "trust": 1.0, "vendor": "ibm", "version": "6.3.0" }, { "model": "tivoli storage manager", "scope": "gte", "trust": 1.0, "vendor": "ibm", "version": "6.1.0" }, { "model": "tivoli storage manager", "scope": "lte", "trust": 1.0, "vendor": "ibm", "version": "6.1.5.6" }, { "model": "tivoli storage manager", "scope": "lte", "trust": 1.0, "vendor": "ibm", "version": "5.5.4.3" }, { "model": "tivoli storage manager", "scope": "gte", "trust": 1.0, "vendor": "ibm", "version": "5.5.0" }, { "model": "tivoli storage manager", "scope": "lte", "trust": 1.0, "vendor": "ibm", "version": "5.4.3.6" }, { "model": "tivoli storage manager", "scope": "lte", "trust": 1.0, "vendor": "ibm", "version": "6.2.5.3" }, { "model": "tivoli storage manager", "scope": "gte", "trust": 1.0, "vendor": "ibm", "version": "5.4.0" }, { "model": "tivoli storage manager", "scope": "lte", "trust": 1.0, "vendor": "ibm", "version": "6.3.2.2" }, { "model": "spectrum protect", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "5.5 to 5.5.4.3" }, { "model": "spectrum protect", "scope": "lt", "trust": 0.8, "vendor": "ibm", "version": "6.3" }, { "model": "spectrum protect", "scope": "lt", "trust": 0.8, "vendor": "ibm", "version": "6.2" }, { "model": "spectrum protect", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.3.2.3" }, { "model": "spectrum protect", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "5.4 to 5.4.3.6" }, { "model": "spectrum protect", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.2.5.4" }, { "model": "spectrum protect", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.1 to 6.1.5.6" }, { "model": "tivoli storage manager", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "6.1" }, { "model": "tivoli storage manager", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "5.4" }, { "model": "tivoli storage manager", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "5.5" }, { "model": "tivoli storage manager", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "6.3" }, { "model": "tivoli storage manager", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "6.2" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.4" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.3" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.2.2" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.0" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0.0" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.5.3" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.5.0" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.4.0" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.1" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.0" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.0" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.5.6" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.5.0" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.3.4" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.3.0" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.0" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.4.3" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.4.0" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.2.7" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.2.12" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.0.0" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.3.6" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.3.4" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.3.3" }, { "model": "tivoli storage manager client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.0.0" } ], "sources": [ { "db": "BID", "id": "74320" }, { "db": "JVNDB", "id": "JVNDB-2014-007936" }, { "db": "NVD", "id": "CVE-2014-6184" }, { "db": "CNNVD", "id": "CNNVD-201502-377" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ibm:tivoli_storage_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.4.3.6", "versionStartIncluding": "5.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:tivoli_storage_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.5.4.3", "versionStartIncluding": "5.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:tivoli_storage_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.1.5.6", "versionStartIncluding": "6.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:tivoli_storage_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.2.5.3", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:tivoli_storage_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.3.2.2", "versionStartIncluding": "6.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-6184" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Matthias Kaiser from Daimler TSS GmbH", "sources": [ { "db": "BID", "id": "74320" } ], "trust": 0.3 }, "cve": "CVE-2014-6184", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2014-6184", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-74127", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-6184", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201502-377", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-74127", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-74127" }, { "db": "JVNDB", "id": "JVNDB-2014-007936" }, { "db": "NVD", "id": "CVE-2014-6184" }, { "db": "CNNVD", "id": "CNNVD-201502-377" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in dsmtca in the client in IBM Tivoli Storage Manager (TSM) 5.4 through 5.4.3.6, 5.5 through 5.5.4.3, 6.1 through 6.1.5.6, 6.2 before 6.2.5.4, and 6.3 before 6.3.2.3 on UNIX, Linux, and OS X allows local users to gain privileges via unspecified vectors. \nSuccessful exploits may allow attackers to execute arbitrary code in the context of the application with root privileges. Failed exploits may result in denial-of-service conditions. IBM Tivoli Storage Manager (TSM) is a set of backup and recovery management solutions of IBM Corporation in the United States. The solution supports data protection, space management and archiving, business recovery and disaster recovery, etc. The dsmtca program in the IBM TSM client has a stack-based buffer overflow vulnerability. A local attacker could exploit this vulnerability to gain privileges. The following versions are affected: IBM TSM versions 5.4 through 5.4.3.6, 5.5 through 5.5.4.3, 6.1 through 6.1.5.6, 6.2.0.0 through 6.2.5.3 on UNIX, Linux and OS X platforms, Version 6.3.0.0 to version 6.3.2.2", "sources": [ { "db": "NVD", "id": "CVE-2014-6184" }, { "db": "JVNDB", "id": "JVNDB-2014-007936" }, { "db": "BID", "id": "74320" }, { "db": "VULHUB", "id": "VHN-74127" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-6184", "trust": 2.8 }, { "db": "JVNDB", "id": "JVNDB-2014-007936", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201502-377", "trust": 0.7 }, { "db": "BID", "id": "74320", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-74127", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-74127" }, { "db": "BID", "id": "74320" }, { "db": "JVNDB", "id": "JVNDB-2014-007936" }, { "db": "NVD", "id": "CVE-2014-6184" }, { "db": "CNNVD", "id": "CNNVD-201502-377" } ] }, "id": "VAR-201502-0228", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-74127" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:30:27.237000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "1695878", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695878" }, { "title": "6.3.2.3-TIV-TSMBAC-LinuxX86", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54036" }, { "title": "6.2.5.4-TIV-TSMBAC-Mac", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54035" }, { "title": "6.2.5.4-TIV-TSMBAC-LinuxX86", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54034" }, { "title": "6.3.2.3-TIV-TSMBAC-Mac", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54037" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-007936" }, { "db": "CNNVD", "id": "CNNVD-201502-377" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-119", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-74127" }, { "db": "JVNDB", "id": "JVNDB-2014-007936" }, { "db": "NVD", "id": "CVE-2014-6184" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695878" }, { "trust": 1.7, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1it05707" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6184" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6184" }, { "trust": 0.3, "url": "http://www.ibm.com" } ], "sources": [ { "db": "VULHUB", "id": "VHN-74127" }, { "db": "BID", "id": "74320" }, { "db": "JVNDB", "id": "JVNDB-2014-007936" }, { "db": "NVD", "id": "CVE-2014-6184" }, { "db": "CNNVD", "id": "CNNVD-201502-377" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-74127" }, { "db": "BID", "id": "74320" }, { "db": "JVNDB", "id": "JVNDB-2014-007936" }, { "db": "NVD", "id": "CVE-2014-6184" }, { "db": "CNNVD", "id": "CNNVD-201502-377" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-02-22T00:00:00", "db": "VULHUB", "id": "VHN-74127" }, { "date": "2015-04-24T00:00:00", "db": "BID", "id": "74320" }, { "date": "2015-02-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-007936" }, { "date": "2015-02-22T02:59:00.060000", "db": "NVD", "id": "CVE-2014-6184" }, { "date": "2015-02-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-377" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-25T00:00:00", "db": "VULHUB", "id": "VHN-74127" }, { "date": "2015-04-24T00:00:00", "db": "BID", "id": "74320" }, { "date": "2015-02-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-007936" }, { "date": "2021-09-08T17:19:30.890000", "db": "NVD", "id": "CVE-2014-6184" }, { "date": "2020-09-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-377" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "74320" }, { "db": "CNNVD", "id": "CNNVD-201502-377" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural OS Run on IBM Tivoli Storage Manager Client\u0027s dsmtca Vulnerable to stack-based buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-007936" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201502-377" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.