var-201610-0206
Vulnerability from variot
On Samsung Galaxy S4 through S7 devices, the "omacp" app ignores security information embedded in the OMACP messages resulting in remote unsolicited WAP Push SMS messages being accepted, parsed, and handled by the device, leading to unauthorized configuration changes, a subset of SVE-2016-6542. This vulnerability SVE-2016-6542 Is part of Supplementary information : CWE Vulnerability type by CWE-388: Error Handling ( Error handling ) Has been identified. SamsungGalaxyS4 and so on are all smart mobile devices released by South Korea's Samsung. The SamsungGalaxyS4 to S7 device has an unauthorized modification vulnerability. The vulnerability stems from the program's ignoring of security information embedded in OMACP information. The remote attacker can use this vulnerability to receive, parse, and process unknown WAPSushSMS information, resulting in unauthorized modification of configuration information. Multiple Samsung Galaxy products are prone to a security-bypass vulnerability. An attacker may exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Samsung Galaxy S4 through S7 devices are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0206", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "android", "scope": "eq", "trust": 2.7, "vendor": "google", "version": "6.0" }, { "model": "android", "scope": "eq", "trust": 2.1, "vendor": "google", "version": "4.4" }, { "model": "android", "scope": "eq", "trust": 1.9, "vendor": "google", "version": "6.0.1" }, { "model": "android", "scope": "eq", "trust": 1.9, "vendor": "google", "version": "5.1.1" }, { "model": "android", "scope": "eq", "trust": 1.9, "vendor": "google", "version": "5.0.2" }, { "model": "android", "scope": "eq", "trust": 1.9, "vendor": "google", "version": "5.0.1" }, { "model": "android", "scope": "eq", "trust": 1.9, "vendor": "google", "version": "4.4.4" }, { "model": "android", "scope": "eq", "trust": 1.9, "vendor": "google", "version": "4.2.2" }, { "model": "android", "scope": "eq", "trust": 1.9, "vendor": "google", "version": "5.1" }, { "model": "android", "scope": "eq", "trust": 1.9, "vendor": "google", "version": "5.0" }, { "model": "android", "scope": "eq", "trust": 1.6, "vendor": "google", "version": "5.1.0" }, { "model": "android", "scope": "eq", "trust": 1.3, "vendor": "google", "version": "4.4.3" }, { "model": "android", "scope": "eq", "trust": 1.3, "vendor": "google", "version": "4.4.2" }, { "model": "android", "scope": "eq", "trust": 1.3, "vendor": "google", "version": "4.4.1" }, { "model": "android", "scope": "eq", "trust": 1.3, "vendor": "google", "version": "4.3.1" }, { "model": "android", "scope": "eq", "trust": 1.3, "vendor": "google", "version": "4.3" }, { "model": "android", "scope": "eq", "trust": 0.8, "vendor": "google", "version": "5.0/5.1" }, { "model": "galaxy s4", "scope": null, "trust": 0.8, "vendor": "samsung", "version": null }, { "model": "galaxy s4 mini", "scope": null, "trust": 0.8, "vendor": "samsung", "version": null }, { "model": "galaxy s5", "scope": null, "trust": 0.8, "vendor": "samsung", "version": null }, { "model": "galaxy s6", "scope": null, "trust": 0.8, "vendor": "samsung", "version": null }, { "model": "galaxy s7", "scope": null, "trust": 0.8, "vendor": "samsung", "version": null }, { "model": "galaxy \u003e=s4,\u003c=s7", "scope": null, "trust": 0.6, "vendor": "samsung", "version": null }, { "model": "galaxy s7", "scope": "eq", "trust": 0.3, "vendor": "samsung", "version": "0" }, { "model": "galaxy s6 edge", "scope": "eq", "trust": 0.3, "vendor": "samsung", "version": "0" }, { "model": "galaxy s6", "scope": "eq", "trust": 0.3, "vendor": "samsung", "version": "0" }, { "model": "galaxy s5", "scope": "eq", "trust": 0.3, "vendor": "samsung", "version": "0" }, { "model": "galaxy s4 mini", "scope": "eq", "trust": 0.3, "vendor": "samsung", "version": "0" }, { "model": "galaxy s4", "scope": "eq", "trust": 0.3, "vendor": "samsung", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10515" }, { "db": "BID", "id": "94088" }, { "db": "JVNDB", "id": "JVNDB-2016-005689" }, { "db": "NVD", "id": "CVE-2016-7991" }, { "db": "CNNVD", "id": "CNNVD-201610-875" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:samsung:galaxy_s4_mini:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:samsung:galaxy_s5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:samsung:galaxy_s7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-7991" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tom Court of Context.", "sources": [ { "db": "BID", "id": "94088" } ], "trust": 0.3 }, "cve": "CVE-2016-7991", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-7991", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-10515", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-7991", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-7991", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-10515", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201610-875", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10515" }, { "db": "JVNDB", "id": "JVNDB-2016-005689" }, { "db": "NVD", "id": "CVE-2016-7991" }, { "db": "CNNVD", "id": "CNNVD-201610-875" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "On Samsung Galaxy S4 through S7 devices, the \"omacp\" app ignores security information embedded in the OMACP messages resulting in remote unsolicited WAP Push SMS messages being accepted, parsed, and handled by the device, leading to unauthorized configuration changes, a subset of SVE-2016-6542. This vulnerability SVE-2016-6542 Is part of Supplementary information : CWE Vulnerability type by CWE-388: Error Handling ( Error handling ) Has been identified. SamsungGalaxyS4 and so on are all smart mobile devices released by South Korea\u0027s Samsung. The SamsungGalaxyS4 to S7 device has an unauthorized modification vulnerability. The vulnerability stems from the program\u0027s ignoring of security information embedded in OMACP information. The remote attacker can use this vulnerability to receive, parse, and process unknown WAPSushSMS information, resulting in unauthorized modification of configuration information. Multiple Samsung Galaxy products are prone to a security-bypass vulnerability. \nAn attacker may exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. \nSamsung Galaxy S4 through S7 devices are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2016-7991" }, { "db": "JVNDB", "id": "JVNDB-2016-005689" }, { "db": "CNVD", "id": "CNVD-2016-10515" }, { "db": "BID", "id": "94088" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-7991", "trust": 3.3 }, { "db": "BID", "id": "94088", "trust": 1.3 }, { "db": "JVNDB", "id": "JVNDB-2016-005689", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2016-10515", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201610-875", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10515" }, { "db": "BID", "id": "94088" }, { "db": "JVNDB", "id": "JVNDB-2016-005689" }, { "db": "NVD", "id": "CVE-2016-7991" }, { "db": "CNNVD", "id": "CNNVD-201610-875" } ] }, "id": "VAR-201610-0206", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-10515" } ], "trust": 1.081343704 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10515" } ] }, "last_update_date": "2023-12-18T13:57:29.130000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "https://www.android.com/intl/ja_jp/" }, { "title": "SVE-2016-6542", "trust": 0.8, "url": "http://security.samsungmobile.com/smrupdate.html#smr-aug-2016" }, { "title": "SamsungGalaxyS4 to S7 devices have patches for unauthorized modification of vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/83380" }, { "title": "Multiple Samsung Galaxy Repair measures for device security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65196" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10515" }, { "db": "JVNDB", "id": "JVNDB-2016-005689" }, { "db": "CNNVD", "id": "CNNVD-201610-875" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-388", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005689" }, { "db": "NVD", "id": "CVE-2016-7991" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://security.samsungmobile.com/smrupdate.html#smr-aug-2016" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/94088" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7991" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-7991" }, { "trust": 0.6, "url": "http://security.samsungmobile.com/smrupdate.html#smr" }, { "trust": 0.3, "url": "http://www.samsung.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10515" }, { "db": "BID", "id": "94088" }, { "db": "JVNDB", "id": "JVNDB-2016-005689" }, { "db": "NVD", "id": "CVE-2016-7991" }, { "db": "CNNVD", "id": "CNNVD-201610-875" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-10515" }, { "db": "BID", "id": "94088" }, { "db": "JVNDB", "id": "JVNDB-2016-005689" }, { "db": "NVD", "id": "CVE-2016-7991" }, { "db": "CNNVD", "id": "CNNVD-201610-875" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-02T00:00:00", "db": "CNVD", "id": "CNVD-2016-10515" }, { "date": "2016-11-01T00:00:00", "db": "BID", "id": "94088" }, { "date": "2016-11-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005689" }, { "date": "2016-10-31T10:59:08.147000", "db": "NVD", "id": "CVE-2016-7991" }, { "date": "2016-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-875" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-02T00:00:00", "db": "CNVD", "id": "CNVD-2016-10515" }, { "date": "2016-11-24T01:07:00", "db": "BID", "id": "94088" }, { "date": "2016-11-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005689" }, { "date": "2016-12-02T23:37:50.417000", "db": "NVD", "id": "CVE-2016-7991" }, { "date": "2016-11-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-875" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-875" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Samsung Galaxy Unapproved on device WAP Push SMS Message acceptance vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005689" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-875" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.