var-201507-0520
Vulnerability from variot
Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856. Cisco Nexus and MDS 9000 Run on device Cisco NX-OS Any OS A command execution vulnerability exists. Nexus is Cisco's line of network switches designed for data centers. On the command line interpreter of the Cisco Nexus device, the parameter input filtering of the tar command is invalid. There are multiple privilege escalation vulnerabilities. An authenticated local attacker can use this vulnerability to gain elevated privileges and execute arbitrary commands on the underlying operating system. Cisco NX-OS software is a data center-level operating system that reflects modular design, resiliency, and maintainability. Cisco NX-OS Software for Nexus Series is prone to a local privilege-escalation vulnerability. This issue is being tracked by Cisco Bug ID CSCus44856
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201507-0520", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.2\\(10\\)" }, { "model": "mds 9100 series", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "mds 9200 series", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "mds 9500", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "mds 9700", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 93120tx switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 93128tx switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9332pq switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9336pq aci spini switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9372px switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9372tx switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9396px switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9396tx switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9504 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9508 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9516 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.2(10)" }, { "model": "mds nx-os software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9000\u003e=6.2(10)" }, { "model": "nexus nx-os software", "scope": "gte", "trust": 0.6, "vendor": "cisco", "version": "6.2(10)" }, { "model": "nx-os 6.2 (on nexus and mds", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9000)" }, { "model": "nx-os software for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70006.2(10)" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04196" }, { "db": "CNVD", "id": "CNVD-2015-04580" }, { "db": "BID", "id": "75503" }, { "db": "JVNDB", "id": "JVNDB-2015-003467" }, { "db": "NVD", "id": "CVE-2015-4232" }, { "db": "CNNVD", "id": "CNNVD-201507-091" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:6.2\\(10\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-4232" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Jens Krabbenhoeft", "sources": [ { "db": "BID", "id": "75503" } ], "trust": 0.3 }, "cve": "CVE-2015-4232", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-4232", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.1, "id": "CNVD-2015-04196", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.1, "id": "CNVD-2015-04580", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-82193", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-4232", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-04196", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-04580", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201507-091", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-82193", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04196" }, { "db": "CNVD", "id": "CNVD-2015-04580" }, { "db": "VULHUB", "id": "VHN-82193" }, { "db": "JVNDB", "id": "JVNDB-2015-003467" }, { "db": "NVD", "id": "CVE-2015-4232" }, { "db": "CNNVD", "id": "CNNVD-201507-091" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856. Cisco Nexus and MDS 9000 Run on device Cisco NX-OS Any OS A command execution vulnerability exists. Nexus is Cisco\u0027s line of network switches designed for data centers. On the command line interpreter of the Cisco Nexus device, the parameter input filtering of the tar command is invalid. There are multiple privilege escalation vulnerabilities. An authenticated local attacker can use this vulnerability to gain elevated privileges and execute arbitrary commands on the underlying operating system. Cisco NX-OS software is a data center-level operating system that reflects modular design, resiliency, and maintainability. Cisco NX-OS Software for Nexus Series is prone to a local privilege-escalation vulnerability. \nThis issue is being tracked by Cisco Bug ID CSCus44856", "sources": [ { "db": "NVD", "id": "CVE-2015-4232" }, { "db": "JVNDB", "id": "JVNDB-2015-003467" }, { "db": "CNVD", "id": "CNVD-2015-04196" }, { "db": "CNVD", "id": "CNVD-2015-04580" }, { "db": "BID", "id": "75503" }, { "db": "VULHUB", "id": "VHN-82193" } ], "trust": 3.06 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-4232", "trust": 4.0 }, { "db": "BID", "id": "75503", "trust": 2.0 }, { "db": "SECTRACK", "id": "1032764", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-003467", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201507-091", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-04196", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2015-04580", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-82193", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04196" }, { "db": "CNVD", "id": "CNVD-2015-04580" }, { "db": "VULHUB", "id": "VHN-82193" }, { "db": "BID", "id": "75503" }, { "db": "JVNDB", "id": "JVNDB-2015-003467" }, { "db": "NVD", "id": "CVE-2015-4232" }, { "db": "CNNVD", "id": "CNNVD-201507-091" } ] }, "id": "VAR-201507-0520", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-04196" }, { "db": "CNVD", "id": "CNVD-2015-04580" }, { "db": "VULHUB", "id": "VHN-82193" } ], "trust": 2.12954545 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 1.2 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04196" }, { "db": "CNVD", "id": "CNVD-2015-04580" } ] }, "last_update_date": "2023-12-18T12:51:41.257000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "39569", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39569" }, { "title": "Patch for Cisco Nexus Device NS-OS Software Command Line Interpreter Local Privilege Escalation Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/60299" }, { "title": "Patch for Cisco NX-OS \u0027tar\u0027 Command Verify Privilege Escalation Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/60928" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04196" }, { "db": "CNVD", "id": "CNVD-2015-04580" }, { "db": "JVNDB", "id": "JVNDB-2015-003467" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-82193" }, { "db": "JVNDB", "id": "JVNDB-2015-003467" }, { "db": "NVD", "id": "CVE-2015-4232" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39569" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/75503" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032764" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4232" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4232" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04196" }, { "db": "CNVD", "id": "CNVD-2015-04580" }, { "db": "VULHUB", "id": "VHN-82193" }, { "db": "BID", "id": "75503" }, { "db": "JVNDB", "id": "JVNDB-2015-003467" }, { "db": "NVD", "id": "CVE-2015-4232" }, { "db": "CNNVD", "id": "CNNVD-201507-091" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-04196" }, { "db": "CNVD", "id": "CNVD-2015-04580" }, { "db": "VULHUB", "id": "VHN-82193" }, { "db": "BID", "id": "75503" }, { "db": "JVNDB", "id": "JVNDB-2015-003467" }, { "db": "NVD", "id": "CVE-2015-4232" }, { "db": "CNNVD", "id": "CNNVD-201507-091" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-07-03T00:00:00", "db": "CNVD", "id": "CNVD-2015-04196" }, { "date": "2015-07-16T00:00:00", "db": "CNVD", "id": "CNVD-2015-04580" }, { "date": "2015-07-03T00:00:00", "db": "VULHUB", "id": "VHN-82193" }, { "date": "2015-06-30T00:00:00", "db": "BID", "id": "75503" }, { "date": "2015-07-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003467" }, { "date": "2015-07-03T10:59:01.343000", "db": "NVD", "id": "CVE-2015-4232" }, { "date": "2015-07-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201507-091" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-07-03T00:00:00", "db": "CNVD", "id": "CNVD-2015-04196" }, { "date": "2015-07-16T00:00:00", "db": "CNVD", "id": "CNVD-2015-04580" }, { "date": "2016-12-28T00:00:00", "db": "VULHUB", "id": "VHN-82193" }, { "date": "2015-06-30T00:00:00", "db": "BID", "id": "75503" }, { "date": "2015-07-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003467" }, { "date": "2016-12-28T17:18:22.663000", "db": "NVD", "id": "CVE-2015-4232" }, { "date": "2015-07-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201507-091" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "75503" }, { "db": "CNNVD", "id": "CNNVD-201507-091" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Nexus and MDS 9000 Run on device Cisco NX-OS In any OS Command execution vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003467" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201507-091" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.