var-201903-0960
Vulnerability from variot
A vulnerability in the implementation of Session Initiation Protocol (SIP) processing in Cisco Small Business SPA514G IP Phones could allow an unauthenticated, remote attacker to cause an affected device to become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SIP request messages by an affected device. An attacker could exploit this vulnerability by sending crafted SIP messages to an affected device. A successful exploit could allow the attacker to cause the affected device to become unresponsive, resulting in a DoS condition that persists until the device is restarted manually. Cisco has not released software updates that address this vulnerability. This vulnerability affects Cisco Small Business SPA514G IP Phones that are running firmware release 7.6.2SR2 or earlier. The CiscoSmallBusinessSPA514GIPPhones is an IP phone from Cisco. A resource management error vulnerability exists in CiscoSmallBusinessSPA514GIPPhones that uses 7.6.2 SR2A and previous firmware. An attacker can exploit this issue to cause a denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCvc63989
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201903-0960", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "spa514g", "scope": "lte", "trust": 1.8, "vendor": "cisco", "version": "7.6.2sr2" }, { "model": "small business spa514g ip phones \u003c=7.6.2sr2a", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.6.2" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5.4" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5.3" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5.1" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.4.8" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.4.7" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.4.6" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.4.4" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.4.3" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.3.7" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.3.5" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.5" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.7" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.3" }, { "model": "small business spa500 series ip phones 7.6 sr2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5.7(6)" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5.5" }, { "model": "small business spa500 series ip phones 7.5.2b", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5" }, { "model": "small business spa500 series ip phones 7.4.9c", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "small business spa500 series ip phones 7.4.9a", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "small business spa500 series ip phones 7.4.8a", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.4" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.3" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2" }, { "model": "small business spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-08461" }, { "db": "BID", "id": "107402" }, { "db": "JVNDB", "id": "JVNDB-2019-002485" }, { "db": "NVD", "id": "CVE-2018-0389" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa514g_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.6.2sr2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa514g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0389" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "107402" } ], "trust": 0.3 }, "cve": "CVE-2018-0389", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-0389", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-08461", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-118591", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-0389", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0389", "trust": 1.8, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2018-0389", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-08461", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201903-495", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118591", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-0389", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-08461" }, { "db": "VULHUB", "id": "VHN-118591" }, { "db": "VULMON", "id": "CVE-2018-0389" }, { "db": "JVNDB", "id": "JVNDB-2019-002485" }, { "db": "NVD", "id": "CVE-2018-0389" }, { "db": "NVD", "id": "CVE-2018-0389" }, { "db": "CNNVD", "id": "CNNVD-201903-495" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the implementation of Session Initiation Protocol (SIP) processing in Cisco Small Business SPA514G IP Phones could allow an unauthenticated, remote attacker to cause an affected device to become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SIP request messages by an affected device. An attacker could exploit this vulnerability by sending crafted SIP messages to an affected device. A successful exploit could allow the attacker to cause the affected device to become unresponsive, resulting in a DoS condition that persists until the device is restarted manually. Cisco has not released software updates that address this vulnerability. This vulnerability affects Cisco Small Business SPA514G IP Phones that are running firmware release 7.6.2SR2 or earlier. The CiscoSmallBusinessSPA514GIPPhones is an IP phone from Cisco. A resource management error vulnerability exists in CiscoSmallBusinessSPA514GIPPhones that uses 7.6.2 SR2A and previous firmware. \nAn attacker can exploit this issue to cause a denial-of-service condition. \nThis issue is being tracked by Cisco Bug ID CSCvc63989", "sources": [ { "db": "NVD", "id": "CVE-2018-0389" }, { "db": "JVNDB", "id": "JVNDB-2019-002485" }, { "db": "CNVD", "id": "CNVD-2019-08461" }, { "db": "BID", "id": "107402" }, { "db": "VULHUB", "id": "VHN-118591" }, { "db": "VULMON", "id": "CVE-2018-0389" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0389", "trust": 3.5 }, { "db": "BID", "id": "107402", "trust": 2.1 }, { "db": "JVNDB", "id": "JVNDB-2019-002485", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201903-495", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-08461", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118591", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-0389", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-08461" }, { "db": "VULHUB", "id": "VHN-118591" }, { "db": "VULMON", "id": "CVE-2018-0389" }, { "db": "BID", "id": "107402" }, { "db": "JVNDB", "id": "JVNDB-2019-002485" }, { "db": "NVD", "id": "CVE-2018-0389" }, { "db": "CNNVD", "id": "CNNVD-201903-495" } ] }, "id": "VAR-201903-0960", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-08461" }, { "db": "VULHUB", "id": "VHN-118591" } ], "trust": 1.446794865 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-08461" } ] }, "last_update_date": "2023-12-18T13:38:22.501000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20190313-sip", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190313-sip" }, { "title": "Patch for CiscoSPA514G Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/157559" }, { "title": "Cisco: Cisco Small Business SPA514G IP Phones SIP Denial of Service Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20190313-sip" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cisco-patches-critical-default-password-bug/142814/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-08461" }, { "db": "VULMON", "id": "CVE-2018-0389" }, { "db": "JVNDB", "id": "JVNDB-2019-002485" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-399", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118591" }, { "db": "JVNDB", "id": "JVNDB-2019-002485" }, { "db": "NVD", "id": "CVE-2018-0389" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190313-sip" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0389" }, { "trust": 1.3, "url": "http://www.securityfocus.com/bid/107402" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0389" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/cisco-patches-critical-default-password-bug/142814/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-08461" }, { "db": "VULHUB", "id": "VHN-118591" }, { "db": "VULMON", "id": "CVE-2018-0389" }, { "db": "BID", "id": "107402" }, { "db": "JVNDB", "id": "JVNDB-2019-002485" }, { "db": "NVD", "id": "CVE-2018-0389" }, { "db": "CNNVD", "id": "CNNVD-201903-495" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-08461" }, { "db": "VULHUB", "id": "VHN-118591" }, { "db": "VULMON", "id": "CVE-2018-0389" }, { "db": "BID", "id": "107402" }, { "db": "JVNDB", "id": "JVNDB-2019-002485" }, { "db": "NVD", "id": "CVE-2018-0389" }, { "db": "CNNVD", "id": "CNNVD-201903-495" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-03-28T00:00:00", "db": "CNVD", "id": "CNVD-2019-08461" }, { "date": "2019-03-13T00:00:00", "db": "VULHUB", "id": "VHN-118591" }, { "date": "2019-03-13T00:00:00", "db": "VULMON", "id": "CVE-2018-0389" }, { "date": "2019-03-13T00:00:00", "db": "BID", "id": "107402" }, { "date": "2019-04-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-002485" }, { "date": "2019-03-13T21:29:00.260000", "db": "NVD", "id": "CVE-2018-0389" }, { "date": "2019-03-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201903-495" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-03-28T00:00:00", "db": "CNVD", "id": "CNVD-2019-08461" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118591" }, { "date": "2019-10-09T00:00:00", "db": "VULMON", "id": "CVE-2018-0389" }, { "date": "2019-03-13T00:00:00", "db": "BID", "id": "107402" }, { "date": "2019-04-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-002485" }, { "date": "2019-10-09T23:31:57.163000", "db": "NVD", "id": "CVE-2018-0389" }, { "date": "2019-03-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201903-495" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201903-495" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Small Business SPA514G IP Phone Resource management vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-002485" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201903-495" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.