VAR-201512-0525
Vulnerability from variot - Updated: 2023-12-18 12:37Absolute path traversal vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie FUEL devices with firmware before 3.4.1.105 allows remote attackers to read arbitrary files via a full pathname in a download request during a Wi-Fi session. Seagate There are multiple vulnerabilities in the wireless storage products offered by. Authentication information ( password ) Is hard-coded (CWE-798) - CVE-2015-2874 Not described in manual telnet Service is up and username "root" , Accessible using the default password. CWE-798: Use of Hard-coded Credentials https://cwe.mitre.org/data/definitions/798.html In addition, National Vulnerability Database (NVD) Then CWE-255 It is published as Send request directly (Forced Browsing) (CWE-425) - CVE-2015-2875 By default, anyone can download files when accessing the device wirelessly. Any file on the file system can be downloaded directly. CWE-425: Direct Request ('Forced Browsing') https://cwe.mitre.org/data/definitions/425.html In addition, National Vulnerability Database (NVD) Then CWE-22 It is published as Unlimited upload of dangerous types of files (CWE-434) - CVE-2015-2876 When accessing the device wirelessly with default settings, /media/sda2 You can upload files to the file system. This file system is prepared for file sharing. CWE-434: Unrestricted Upload of File with Dangerous Type https://cwe.mitre.org/data/definitions/434.htmlA remote attacker can access arbitrary files on the product, root It may be operated with authority. Seagate 36C running firmware versions 2.2.0.005 and 2.3.0.014 are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201512-0525",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "lac9000464u",
"scope": "lte",
"trust": 1.0,
"vendor": "lacie",
"version": "2.3.0.014"
},
{
"model": "wireless mobile storage",
"scope": "eq",
"trust": 1.0,
"vendor": "seagate",
"version": "*"
},
{
"model": "goflex sattelite",
"scope": "eq",
"trust": 1.0,
"vendor": "seagate",
"version": "*"
},
{
"model": "wireless plus mobile storage",
"scope": "eq",
"trust": 1.0,
"vendor": "seagate",
"version": "*"
},
{
"model": "lac9000436u",
"scope": "lte",
"trust": 1.0,
"vendor": "lacie",
"version": "2.3.0.014"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "lacie",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "seagate",
"version": null
},
{
"model": "fuel",
"scope": null,
"trust": 0.8,
"vendor": "lacie",
"version": null
},
{
"model": "goflex satellite",
"scope": null,
"trust": 0.8,
"vendor": "seagate",
"version": null
},
{
"model": "wireless mobile storage",
"scope": null,
"trust": 0.8,
"vendor": "seagate",
"version": null
},
{
"model": "wireless plus mobile storage",
"scope": null,
"trust": 0.8,
"vendor": "seagate",
"version": null
},
{
"model": "lac9000464u",
"scope": null,
"trust": 0.6,
"vendor": "lacie",
"version": null
},
{
"model": "lac9000436u",
"scope": null,
"trust": 0.6,
"vendor": "lacie",
"version": null
},
{
"model": "technology llc seagate 36c",
"scope": "eq",
"trust": 0.3,
"vendor": "seagate",
"version": "2.3.0.014"
},
{
"model": "technology llc seagate 36c",
"scope": "eq",
"trust": 0.3,
"vendor": "seagate",
"version": "2.2.0.005"
},
{
"model": "technology llc seagate 36c",
"scope": "ne",
"trust": 0.3,
"vendor": "seagate",
"version": "3.4.1.105"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#903500"
},
{
"db": "BID",
"id": "76547"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006526"
},
{
"db": "NVD",
"id": "CVE-2015-2875"
},
{
"db": "CNNVD",
"id": "CNNVD-201509-208"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:seagate:goflex_sattelite:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:seagate:wireless_plus_mobile_storage:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seagate:wireless_mobile_storage:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:lacie:lac9000464u:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:lacie:lac9000436u:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:lacie:lac9000464u_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.3.0.014",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:lacie:lac9000436u_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.3.0.014",
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-2875"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Mike Baucom, Allen Harper, and J. Rach of Tangible Security",
"sources": [
{
"db": "BID",
"id": "76547"
}
],
"trust": 0.3
},
"cve": "CVE-2015-2875",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "IPA",
"availabilityImpact": "Complete",
"baseScore": 9.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "JVNDB-2015-006526",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-80836",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-2875",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2015-006526",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201509-208",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-80836",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80836"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006526"
},
{
"db": "NVD",
"id": "CVE-2015-2875"
},
{
"db": "CNNVD",
"id": "CNNVD-201509-208"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Absolute path traversal vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie FUEL devices with firmware before 3.4.1.105 allows remote attackers to read arbitrary files via a full pathname in a download request during a Wi-Fi session. Seagate There are multiple vulnerabilities in the wireless storage products offered by. Authentication information ( password ) Is hard-coded (CWE-798) - CVE-2015-2874 Not described in manual telnet Service is up and username \"root\" , Accessible using the default password. CWE-798: Use of Hard-coded Credentials https://cwe.mitre.org/data/definitions/798.html In addition, National Vulnerability Database (NVD) Then CWE-255 It is published as Send request directly (Forced Browsing) (CWE-425) - CVE-2015-2875 By default, anyone can download files when accessing the device wirelessly. Any file on the file system can be downloaded directly. CWE-425: Direct Request (\u0027Forced Browsing\u0027) https://cwe.mitre.org/data/definitions/425.html In addition, National Vulnerability Database (NVD) Then CWE-22 It is published as Unlimited upload of dangerous types of files (CWE-434) - CVE-2015-2876 When accessing the device wirelessly with default settings, /media/sda2 You can upload files to the file system. This file system is prepared for file sharing. CWE-434: Unrestricted Upload of File with Dangerous Type https://cwe.mitre.org/data/definitions/434.htmlA remote attacker can access arbitrary files on the product, root It may be operated with authority. \nSeagate 36C running firmware versions 2.2.0.005 and 2.3.0.014 are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-2875"
},
{
"db": "CERT/CC",
"id": "VU#903500"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006526"
},
{
"db": "BID",
"id": "76547"
},
{
"db": "VULHUB",
"id": "VHN-80836"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#903500",
"trust": 3.6
},
{
"db": "NVD",
"id": "CVE-2015-2875",
"trust": 2.8
},
{
"db": "JVN",
"id": "JVNVU92833570",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006526",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201509-208",
"trust": 0.7
},
{
"db": "BID",
"id": "76547",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-80836",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#903500"
},
{
"db": "VULHUB",
"id": "VHN-80836"
},
{
"db": "BID",
"id": "76547"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006526"
},
{
"db": "NVD",
"id": "CVE-2015-2875"
},
{
"db": "CNNVD",
"id": "CNNVD-201509-208"
}
]
},
"id": "VAR-201512-0525",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-80836"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:37:51.744000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Firmware Updates for Seagate Products",
"trust": 0.8,
"url": "http://knowledge.seagate.com/articles/en_us/faq/207931en"
},
{
"title": "Multiple Seagate Fixes for wireless storage product path traversal vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=57745"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-006526"
},
{
"db": "CNNVD",
"id": "CNNVD-201509-208"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-22",
"trust": 1.9
},
{
"problemtype": "CWE-Other",
"trust": 0.8
},
{
"problemtype": "CWE-255",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80836"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006526"
},
{
"db": "NVD",
"id": "CVE-2015-2875"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "https://www.kb.cert.org/vuls/id/903500"
},
{
"trust": 2.5,
"url": "https://www.kb.cert.org/vuls/id/gwan-9zgtuh"
},
{
"trust": 1.9,
"url": "https://www.kb.cert.org/vuls/id/gwan-a26l3f"
},
{
"trust": 1.4,
"url": "https://apps1.seagate.com/downloads/request.html"
},
{
"trust": 1.4,
"url": "http://knowledge.seagate.com/articles/en_us/faq/207931en"
},
{
"trust": 0.8,
"url": "http://cwe.mitre.org/data/definitions/425.html"
},
{
"trust": 0.8,
"url": "http://cwe.mitre.org/data/definitions/434.html"
},
{
"trust": 0.8,
"url": "http://cwe.mitre.org/data/definitions/798.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2874"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2875"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2876"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu92833570/index.html"
},
{
"trust": 0.8,
"url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-2874"
},
{
"trust": 0.8,
"url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-2875"
},
{
"trust": 0.8,
"url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-2876"
},
{
"trust": 0.3,
"url": "http://www.seagate.com/in/en/"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#903500"
},
{
"db": "VULHUB",
"id": "VHN-80836"
},
{
"db": "BID",
"id": "76547"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006526"
},
{
"db": "NVD",
"id": "CVE-2015-2875"
},
{
"db": "CNNVD",
"id": "CNNVD-201509-208"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#903500"
},
{
"db": "VULHUB",
"id": "VHN-80836"
},
{
"db": "BID",
"id": "76547"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006526"
},
{
"db": "NVD",
"id": "CVE-2015-2875"
},
{
"db": "CNNVD",
"id": "CNNVD-201509-208"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-09-01T00:00:00",
"db": "CERT/CC",
"id": "VU#903500"
},
{
"date": "2015-12-31T00:00:00",
"db": "VULHUB",
"id": "VHN-80836"
},
{
"date": "2015-09-01T00:00:00",
"db": "BID",
"id": "76547"
},
{
"date": "2015-12-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-006526"
},
{
"date": "2015-12-31T05:59:03.720000",
"db": "NVD",
"id": "CVE-2015-2875"
},
{
"date": "2015-09-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201509-208"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-12-08T00:00:00",
"db": "CERT/CC",
"id": "VU#903500"
},
{
"date": "2015-12-31T00:00:00",
"db": "VULHUB",
"id": "VHN-80836"
},
{
"date": "2015-09-01T00:00:00",
"db": "BID",
"id": "76547"
},
{
"date": "2016-01-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-006526"
},
{
"date": "2015-12-31T20:29:55.210000",
"db": "NVD",
"id": "CVE-2015-2875"
},
{
"date": "2016-01-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201509-208"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201509-208"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Seagate and LaCie wireless storage products contain multiple vulnerabilities",
"sources": [
{
"db": "CERT/CC",
"id": "VU#903500"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "path traversal",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201509-208"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.