var-200006-0148
Vulnerability from variot

Unify eWave ServletExec allows a remote attacker to view source code of a JSP program by requesting a URL which provides the JSP extension in upper case. Many webservers are case-sensitive, but do not have all possible combinations of cases in mapped extensions mapped properly. In that manner, a user is able to access the source code to those specific files. Microsoft IIS 5.0 has a dedicated scripting engine for advanced file types such as ASP, ASA, HTR, etc. files. The scripting engines handle requests for these file types, processes them accordingly, and then executes them on the server. It is possible to force the server to send back the source of known scriptable files to the client if the HTTP GET request contains a specialized header with 'Translate: f' at the end of it, and if a trailing slash '/' is appended to the end of the URL. The scripting engine will be able to locate the requested file, however, it will not recognize it as a file that needs to be processed and will proceed to send the file source to the client.

Title: Cisco Collaboration Server 5 XSS, Source Code Disclosure

Author: s4squatch

Published: 2010-02-11

Cisco Collaboration Server 5 XSS, Source Code Disclosure Discovered by: s4squatch of SecureState R&D Team (www.securestate.com Discovered: 08/26/2008

Note: End of Engineering --> http://www.cisco.com/en/US/products/sw/custcosw/ps747/prod_eol_notice09186a008032d4d0.html Replaced with: http://www.cisco.com/en/US/products/ps7233/index.html and http://www.cisco.com/en/US/products/ps7236/index.html

XSS

http://www.website.com/webline/html/admin/wcs/LoginPage.jhtml?oper=&dest=">

Java Servlet Source Code Disclosure

The source code of .jhtml files is revealed to the end user by requesting any of the following:

Normal File: file.html

Modified 1: file%2Ejhtml Modified 2: file.jhtm%6C Modified 3: file.jhtml%00 Modified 4: file.jhtml%c0%80

Cisco Collaboration Server 5 Paths It Works On (list may not be complete)

http://www.website.com/doc/docindex.jhtml http://www.website.com/browserId/wizardForm.jhtml http://www.website.com/webline/html/forms/callback.jhtml http://www.website.com/webline/html/forms/callbackICM.jhtml http://www.website.com/webline/html/agent/AgentFrame.jhtml http://www.website.com/webline/html/agent/default/badlogin.jhtml http://www.website.com/callme/callForm.jhtml http://www.website.com/webline/html/multichatui/nowDefunctWindow.jhtml http://www.website.com/browserId/wizard.jhtml http://www.website.com/admin/CiscoAdmin.jhtml http://www.website.com/msccallme/mscCallForm.jhtml http://www.website.com/webline/html/admin/wcs/LoginPage.jhtml

Related Public Info

http://www.securityfocus.com/bid/3592/info http://www.securityfocus.com/bid/1578/info http://www.securityfocus.com/bid/1328/info

Scott Whiteswhite@securestate.com | Senior Consultant | SecureState 623.321.2660 - office | 480.440.7595 - mobile | 216.927.2801 - fax

[cid:image001.png@01CAAB16.BDE852B0]https://www.securestate.com/

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200006-0148",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ewave servletexec",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "unify",
        "version": null
      },
      {
        "model": "ewave servletexec",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "unify",
        "version": "3.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.2.1"
      },
      {
        "model": "systems weblogic server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bea",
        "version": "4.5.1"
      },
      {
        "model": "systems weblogic",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bea",
        "version": "4.0.4"
      },
      {
        "model": "systems weblogic",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bea",
        "version": "3.1.8"
      },
      {
        "model": "ewave servletexec c",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "unify",
        "version": "3.0"
      },
      {
        "model": "iis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "5.0"
      },
      {
        "model": "iis",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "1328"
      },
      {
        "db": "BID",
        "id": "1578"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200006-036"
      },
      {
        "db": "NVD",
        "id": "CVE-2000-0498"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unify Exploit : Discovered by Niclas Vikstrom and posted to NTbugtraq on June 8, 2000.\n\n BEA Systems exploit : Discovered by Shreeraj Shah and published by Foundstone, Inc., June 12, 2000.\n\n IBM WebSphere Application Server exploit : Discovered by Shreera",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200006-036"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2000-0498",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2000-0498",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2000-0498",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2000-0498",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200006-036",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200006-036"
      },
      {
        "db": "NVD",
        "id": "CVE-2000-0498"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unify eWave ServletExec allows a remote attacker to view source code of a JSP program by requesting a URL which provides the JSP extension in upper case. Many webservers are case-sensitive, but do not have all possible combinations of cases in mapped extensions mapped properly. In that manner, a user is able to access the source code to those specific files. Microsoft IIS 5.0 has a dedicated scripting engine for advanced file types such as ASP, ASA, HTR, etc. files. The scripting engines handle requests for these file types, processes them accordingly, and then executes them  on the server. \nIt is possible to force the server to send back the source of known scriptable files to the client if the HTTP GET request contains a specialized header with \u0027Translate: f\u0027 at the end of it, and if a trailing slash \u0027/\u0027 is appended to the end of the URL. The scripting engine will be able to locate the requested file, however, it will not recognize it as a file that needs to be processed and will proceed to send the file source to the client. \n\n# Title: Cisco Collaboration Server 5 XSS, Source Code Disclosure\n# Author: s4squatch\n# Published: 2010-02-11\n\n\nCisco Collaboration Server 5 XSS, Source Code Disclosure\nDiscovered by:  s4squatch of SecureState R\u0026D Team (www.securestate.com\nDiscovered: 08/26/2008\n\nNote: End of Engineering  --\u003e  http://www.cisco.com/en/US/products/sw/custcosw/ps747/prod_eol_notice09186a008032d4d0.html\nReplaced with: http://www.cisco.com/en/US/products/ps7233/index.html and http://www.cisco.com/en/US/products/ps7236/index.html\n\n\nXSS\n===\nhttp://www.website.com/webline/html/admin/wcs/LoginPage.jhtml?oper=\u0026dest=\"\u003e\n\n\n\nJava Servlet Source Code Disclosure\n===================================\nThe source code of .jhtml files is revealed to the end user by requesting any of the following:\n\nNormal File:                        file.html\n\nModified 1:                                         file%2Ejhtml\nModified 2:                                         file.jhtm%6C\nModified 3:                                         file.jhtml%00\nModified 4:                                         file.jhtml%c0%80\n\nCisco Collaboration Server 5 Paths It Works On (list may not be complete)\n=========================================================================\nhttp://www.website.com/doc/docindex.jhtml\nhttp://www.website.com/browserId/wizardForm.jhtml\nhttp://www.website.com/webline/html/forms/callback.jhtml\nhttp://www.website.com/webline/html/forms/callbackICM.jhtml\nhttp://www.website.com/webline/html/agent/AgentFrame.jhtml\nhttp://www.website.com/webline/html/agent/default/badlogin.jhtml\nhttp://www.website.com/callme/callForm.jhtml\nhttp://www.website.com/webline/html/multichatui/nowDefunctWindow.jhtml\nhttp://www.website.com/browserId/wizard.jhtml\nhttp://www.website.com/admin/CiscoAdmin.jhtml\nhttp://www.website.com/msccallme/mscCallForm.jhtml\nhttp://www.website.com/webline/html/admin/wcs/LoginPage.jhtml\n\nRelated Public Info\n===================\nhttp://www.securityfocus.com/bid/3592/info\nhttp://www.securityfocus.com/bid/1578/info\nhttp://www.securityfocus.com/bid/1328/info\n\n\nScott White\u003cmailto:swhite@securestate.com\u003e                | Senior Consultant          | SecureState\n623.321.2660 - office | 480.440.7595 - mobile | 216.927.2801 - fax\n\n[cid:image001.png@01CAAB16.BDE852B0]\u003chttps://www.securestate.com/\u003e\n\n\n\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2000-0498"
      },
      {
        "db": "BID",
        "id": "1328"
      },
      {
        "db": "BID",
        "id": "1578"
      },
      {
        "db": "PACKETSTORM",
        "id": "86199"
      }
    ],
    "trust": 1.53
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "1328",
        "trust": 2.0
      },
      {
        "db": "NVD",
        "id": "CVE-2000-0498",
        "trust": 1.6
      },
      {
        "db": "NTBUGTRAQ",
        "id": "20000608 POTENTIAL VULNERABILITY IN UNIFY EWAVE SERVLETEXEC",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "4649",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200006-036",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "1578",
        "trust": 0.4
      },
      {
        "db": "BID",
        "id": "3592",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "86199",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "1328"
      },
      {
        "db": "BID",
        "id": "1578"
      },
      {
        "db": "PACKETSTORM",
        "id": "86199"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200006-036"
      },
      {
        "db": "NVD",
        "id": "CVE-2000-0498"
      }
    ]
  },
  "id": "VAR-200006-0148",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 1.0
  },
  "last_update_date": "2024-08-14T14:16:23.956000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-178",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2000-0498"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0250.html"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/1328"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4649"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/static/4649.php"
      },
      {
        "trust": 0.3,
        "url": "http://www.servletexec.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.beasys.com/products/weblogic/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www-4.ibm.com/software/webservers/appserv/efix.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.microsoft.com/technet/security/bulletin/fq00-058.asp"
      },
      {
        "trust": 0.1,
        "url": "http://www.website.com/doc/docindex.jhtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.website.com/webline/html/admin/wcs/loginpage.jhtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.website.com/callme/callform.jhtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.securityfocus.com/bid/1578/info"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/en/us/products/ps7233/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.website.com/webline/html/forms/callback.jhtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.website.com/browserid/wizard.jhtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.website.com/webline/html/agent/default/badlogin.jhtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.securityfocus.com/bid/1328/info"
      },
      {
        "trust": 0.1,
        "url": "http://www.website.com/webline/html/forms/callbackicm.jhtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.website.com/msccallme/msccallform.jhtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.website.com/browserid/wizardform.jhtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.website.com/webline/html/admin/wcs/loginpage.jhtml?oper=\u0026dest=\"\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.website.com/webline/html/multichatui/nowdefunctwindow.jhtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/en/us/products/ps7236/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.securityfocus.com/bid/3592/info"
      },
      {
        "trust": 0.1,
        "url": "https://www.securestate.com/\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.website.com/webline/html/agent/agentframe.jhtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.website.com/admin/ciscoadmin.jhtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/en/us/products/sw/custcosw/ps747/prod_eol_notice09186a008032d4d0.html"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "1328"
      },
      {
        "db": "BID",
        "id": "1578"
      },
      {
        "db": "PACKETSTORM",
        "id": "86199"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200006-036"
      },
      {
        "db": "NVD",
        "id": "CVE-2000-0498"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "1328"
      },
      {
        "db": "BID",
        "id": "1578"
      },
      {
        "db": "PACKETSTORM",
        "id": "86199"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200006-036"
      },
      {
        "db": "NVD",
        "id": "CVE-2000-0498"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2000-06-08T00:00:00",
        "db": "BID",
        "id": "1328"
      },
      {
        "date": "2000-08-14T00:00:00",
        "db": "BID",
        "id": "1578"
      },
      {
        "date": "2010-02-12T06:51:39",
        "db": "PACKETSTORM",
        "id": "86199"
      },
      {
        "date": "2000-06-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200006-036"
      },
      {
        "date": "2000-06-08T04:00:00",
        "db": "NVD",
        "id": "CVE-2000-0498"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2000-06-08T00:00:00",
        "db": "BID",
        "id": "1328"
      },
      {
        "date": "2000-08-14T00:00:00",
        "db": "BID",
        "id": "1578"
      },
      {
        "date": "2005-07-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200006-036"
      },
      {
        "date": "2024-01-26T17:43:10.780000",
        "db": "NVD",
        "id": "CVE-2000-0498"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "1328"
      },
      {
        "db": "BID",
        "id": "1578"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "JSP Source code leak vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200006-036"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "1328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200006-036"
      }
    ],
    "trust": 0.9
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.