var-200006-0151
Vulnerability from variot
IIS 5.0 allows remote attackers to obtain source code for .ASP files and other scripts via an HTTP GET request with a "Translate: f" header, aka the "Specialized Header" vulnerability. Microsoft IIS Is "Translate: f" Header added HTTP GET When a request is received, a flaw exists that locates the correct file but does not recognize it as a file that needs to be processed by the script engine and sends that file to the browser..ASP And .ASA And .HTR You may be able to view source files that have a normal extension that cannot be viewed. Many webservers are case-sensitive, but do not have all possible combinations of cases in mapped extensions mapped properly. By changing the letters in a JSP or a JHTML file extension from lower case to upper case (eg: .jsp or .jhtml becomes .JSP or .JHTML) in a URL the server does not recognize the file extension and sends the file normally. In that manner, a user is able to access the source code to those specific files. Microsoft IIS 5.0 has a dedicated scripting engine for advanced file types such as ASP, ASA, HTR, etc. files. The scripting engines handle requests for these file types, processes them accordingly, and then executes them on the server.
Title: Cisco Collaboration Server 5 XSS, Source Code Disclosure
Author: s4squatch
Published: 2010-02-11
Cisco Collaboration Server 5 XSS, Source Code Disclosure Discovered by: s4squatch of SecureState R&D Team (www.securestate.com Discovered: 08/26/2008
Note: End of Engineering --> http://www.cisco.com/en/US/products/sw/custcosw/ps747/prod_eol_notice09186a008032d4d0.html Replaced with: http://www.cisco.com/en/US/products/ps7233/index.html and http://www.cisco.com/en/US/products/ps7236/index.html
XSS
http://www.website.com/webline/html/admin/wcs/LoginPage.jhtml?oper=&dest=">
Java Servlet Source Code Disclosure
The source code of .jhtml files is revealed to the end user by requesting any of the following:
Normal File: file.html
Modified 1: file%2Ejhtml Modified 2: file.jhtm%6C Modified 3: file.jhtml%00 Modified 4: file.jhtml%c0%80
Cisco Collaboration Server 5 Paths It Works On (list may not be complete)
http://www.website.com/doc/docindex.jhtml http://www.website.com/browserId/wizardForm.jhtml http://www.website.com/webline/html/forms/callback.jhtml http://www.website.com/webline/html/forms/callbackICM.jhtml http://www.website.com/webline/html/agent/AgentFrame.jhtml http://www.website.com/webline/html/agent/default/badlogin.jhtml http://www.website.com/callme/callForm.jhtml http://www.website.com/webline/html/multichatui/nowDefunctWindow.jhtml http://www.website.com/browserId/wizard.jhtml http://www.website.com/admin/CiscoAdmin.jhtml http://www.website.com/msccallme/mscCallForm.jhtml http://www.website.com/webline/html/admin/wcs/LoginPage.jhtml
Related Public Info
http://www.securityfocus.com/bid/3592/info http://www.securityfocus.com/bid/1578/info http://www.securityfocus.com/bid/1328/info
Scott Whiteswhite@securestate.com | Senior Consultant | SecureState 623.321.2660 - office | 480.440.7595 - mobile | 216.927.2801 - fax
[cid:image001.png@01CAAB16.BDE852B0]https://www.securestate.com/
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200006-0151", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "internet information services", "scope": "eq", "trust": 1.6, "vendor": "microsoft", "version": "5.0" }, { "model": "iis", "scope": "eq", "trust": 1.1, "vendor": "microsoft", "version": "5.0" }, { "model": "internet information server", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "5.0" }, { "model": "ewave servletexec", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "3.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.2.1" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "4.5.1" }, { "model": "systems weblogic", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "4.0.4" }, { "model": "systems weblogic", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "3.1.8" }, { "model": "ewave servletexec c", "scope": "ne", "trust": 0.3, "vendor": "unify", "version": "3.0" }, { "model": "iis", "scope": "ne", "trust": 0.3, "vendor": "microsoft", "version": "4.0" } ], "sources": [ { "db": "BID", "id": "1328" }, { "db": "BID", "id": "1578" }, { "db": "JVNDB", "id": "JVNDB-2000-000057" }, { "db": "CNNVD", "id": "CNNVD-200010-019" }, { "db": "NVD", "id": "CVE-2000-0778" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:microsoft:iis", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2000-000057" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Daniel Docekal\u203b ddoc@MIA.CZ", "sources": [ { "db": "CNNVD", "id": "CNNVD-200010-019" } ], "trust": 0.6 }, "cve": "CVE-2000-0778", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2000-0778", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2000-0778", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2000-0778", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200010-019", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2000-000057" }, { "db": "CNNVD", "id": "CNNVD-200010-019" }, { "db": "NVD", "id": "CVE-2000-0778" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "IIS 5.0 allows remote attackers to obtain source code for .ASP files and other scripts via an HTTP GET request with a \"Translate: f\" header, aka the \"Specialized Header\" vulnerability. Microsoft IIS Is \"Translate: f\" Header added HTTP GET When a request is received, a flaw exists that locates the correct file but does not recognize it as a file that needs to be processed by the script engine and sends that file to the browser..ASP And .ASA And .HTR You may be able to view source files that have a normal extension that cannot be viewed. Many webservers are case-sensitive, but do not have all possible combinations of cases in mapped extensions mapped properly. \nBy changing the letters in a JSP or a JHTML file extension from lower case to upper case (eg: .jsp or .jhtml becomes .JSP or .JHTML) in a URL the server does not recognize the file extension and sends the file normally. In that manner, a user is able to access the source code to those specific files. Microsoft IIS 5.0 has a dedicated scripting engine for advanced file types such as ASP, ASA, HTR, etc. files. The scripting engines handle requests for these file types, processes them accordingly, and then executes them on the server. \n\n# Title: Cisco Collaboration Server 5 XSS, Source Code Disclosure\n# Author: s4squatch\n# Published: 2010-02-11\n\n\nCisco Collaboration Server 5 XSS, Source Code Disclosure\nDiscovered by: s4squatch of SecureState R\u0026D Team (www.securestate.com\nDiscovered: 08/26/2008\n\nNote: End of Engineering --\u003e http://www.cisco.com/en/US/products/sw/custcosw/ps747/prod_eol_notice09186a008032d4d0.html\nReplaced with: http://www.cisco.com/en/US/products/ps7233/index.html and http://www.cisco.com/en/US/products/ps7236/index.html\n\n\nXSS\n===\nhttp://www.website.com/webline/html/admin/wcs/LoginPage.jhtml?oper=\u0026dest=\"\u003e\n\n\n\nJava Servlet Source Code Disclosure\n===================================\nThe source code of .jhtml files is revealed to the end user by requesting any of the following:\n\nNormal File: file.html\n\nModified 1: file%2Ejhtml\nModified 2: file.jhtm%6C\nModified 3: file.jhtml%00\nModified 4: file.jhtml%c0%80\n\nCisco Collaboration Server 5 Paths It Works On (list may not be complete)\n=========================================================================\nhttp://www.website.com/doc/docindex.jhtml\nhttp://www.website.com/browserId/wizardForm.jhtml\nhttp://www.website.com/webline/html/forms/callback.jhtml\nhttp://www.website.com/webline/html/forms/callbackICM.jhtml\nhttp://www.website.com/webline/html/agent/AgentFrame.jhtml\nhttp://www.website.com/webline/html/agent/default/badlogin.jhtml\nhttp://www.website.com/callme/callForm.jhtml\nhttp://www.website.com/webline/html/multichatui/nowDefunctWindow.jhtml\nhttp://www.website.com/browserId/wizard.jhtml\nhttp://www.website.com/admin/CiscoAdmin.jhtml\nhttp://www.website.com/msccallme/mscCallForm.jhtml\nhttp://www.website.com/webline/html/admin/wcs/LoginPage.jhtml\n\nRelated Public Info\n===================\nhttp://www.securityfocus.com/bid/3592/info\nhttp://www.securityfocus.com/bid/1578/info\nhttp://www.securityfocus.com/bid/1328/info\n\n\nScott White\u003cmailto:swhite@securestate.com\u003e | Senior Consultant | SecureState\n623.321.2660 - office | 480.440.7595 - mobile | 216.927.2801 - fax\n\n[cid:image001.png@01CAAB16.BDE852B0]\u003chttps://www.securestate.com/\u003e\n\n\n\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2000-0778" }, { "db": "JVNDB", "id": "JVNDB-2000-000057" }, { "db": "BID", "id": "1328" }, { "db": "BID", "id": "1578" }, { "db": "PACKETSTORM", "id": "86199" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "1578", "trust": 2.8 }, { "db": "NVD", "id": "CVE-2000-0778", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2000-000057", "trust": 0.8 }, { "db": "NSFOCUS", "id": "752", "trust": 0.6 }, { "db": "MS", "id": "MS00-058", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:927", "trust": 0.6 }, { "db": "NTBUGTRAQ", "id": "20000816 TRANSLATE: F", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20000815 TRANSLATE:F SUMMARY, HISTORY AND THOUGHTS", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200010-019", "trust": 0.6 }, { "db": "BID", "id": "1328", "trust": 0.4 }, { "db": "BID", "id": "3592", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "86199", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "1328" }, { "db": "BID", "id": "1578" }, { "db": "JVNDB", "id": "JVNDB-2000-000057" }, { "db": "PACKETSTORM", "id": "86199" }, { "db": "CNNVD", "id": "CNNVD-200010-019" }, { "db": "NVD", "id": "CVE-2000-0778" } ] }, "id": "VAR-200006-0151", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2024-08-14T14:16:23.993000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "MS00-058", "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/ms00-058.asp" }, { "title": "MS00-058", "trust": 0.8, "url": "http://www.microsoft.com/japan/technet/security/Bulletin/ms00-058.mspx" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2000-000057" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2000-0778" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.securityfocus.com/bid/1578" }, { "trust": 1.6, "url": "http://www.ntbugtraq.com/default.asp?pid=36\u0026sid=1\u0026a2=ind0008\u0026l=ntbugtraq\u0026f=\u0026s=\u0026p=5212" }, { "trust": 1.0, "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=080d5336d882d211b56b0060080f2cd696a7c9%40beta.mia.cz" }, { "trust": 1.0, "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-058" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a927" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2000-0778" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2000-0778" }, { "trust": 0.6, "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=080d5336d882d211b56b0060080f2cd696a7c9@beta.mia.cz" }, { "trust": 0.6, "url": "http://www.microsoft.com/technet/security/bulletin/ms00-058.asp" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:927" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/752" }, { "trust": 0.3, "url": "http://www.servletexec.com/" }, { "trust": 0.3, "url": "http://www.beasys.com/products/weblogic/index.html" }, { "trust": 0.3, "url": "http://www-4.ibm.com/software/webservers/appserv/efix.html" }, { "trust": 0.3, "url": "http://www.microsoft.com/technet/security/bulletin/fq00-058.asp" }, { "trust": 0.1, "url": "http://www.website.com/doc/docindex.jhtml" }, { "trust": 0.1, "url": "http://www.website.com/webline/html/admin/wcs/loginpage.jhtml" }, { "trust": 0.1, "url": "http://www.website.com/callme/callform.jhtml" }, { "trust": 0.1, "url": "http://www.securityfocus.com/bid/1578/info" }, { "trust": 0.1, "url": "http://www.cisco.com/en/us/products/ps7233/index.html" }, { "trust": 0.1, "url": "http://www.website.com/webline/html/forms/callback.jhtml" }, { "trust": 0.1, "url": "http://www.website.com/browserid/wizard.jhtml" }, { "trust": 0.1, "url": "http://www.website.com/webline/html/agent/default/badlogin.jhtml" }, { "trust": 0.1, "url": "http://www.securityfocus.com/bid/1328/info" }, { "trust": 0.1, "url": "http://www.website.com/webline/html/forms/callbackicm.jhtml" }, { "trust": 0.1, "url": "http://www.website.com/msccallme/msccallform.jhtml" }, { "trust": 0.1, "url": "http://www.website.com/browserid/wizardform.jhtml" }, { "trust": 0.1, "url": "http://www.website.com/webline/html/admin/wcs/loginpage.jhtml?oper=\u0026dest=\"\u003e" }, { "trust": 0.1, "url": "http://www.website.com/webline/html/multichatui/nowdefunctwindow.jhtml" }, { "trust": 0.1, "url": "http://www.cisco.com/en/us/products/ps7236/index.html" }, { "trust": 0.1, "url": "http://www.securityfocus.com/bid/3592/info" }, { "trust": 0.1, "url": "https://www.securestate.com/\u003e" }, { "trust": 0.1, "url": "http://www.website.com/webline/html/agent/agentframe.jhtml" }, { "trust": 0.1, "url": "http://www.website.com/admin/ciscoadmin.jhtml" }, { "trust": 0.1, "url": "http://www.cisco.com/en/us/products/sw/custcosw/ps747/prod_eol_notice09186a008032d4d0.html" } ], "sources": [ { "db": "BID", "id": "1328" }, { "db": "BID", "id": "1578" }, { "db": "JVNDB", "id": "JVNDB-2000-000057" }, { "db": "PACKETSTORM", "id": "86199" }, { "db": "CNNVD", "id": "CNNVD-200010-019" }, { "db": "NVD", "id": "CVE-2000-0778" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "1328" }, { "db": "BID", "id": "1578" }, { "db": "JVNDB", "id": "JVNDB-2000-000057" }, { "db": "PACKETSTORM", "id": "86199" }, { "db": "CNNVD", "id": "CNNVD-200010-019" }, { "db": "NVD", "id": "CVE-2000-0778" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2000-06-08T00:00:00", "db": "BID", "id": "1328" }, { "date": "2000-08-14T00:00:00", "db": "BID", "id": "1578" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2000-000057" }, { "date": "2010-02-12T06:51:39", "db": "PACKETSTORM", "id": "86199" }, { "date": "2000-08-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200010-019" }, { "date": "2000-10-20T04:00:00", "db": "NVD", "id": "CVE-2000-0778" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2000-06-08T00:00:00", "db": "BID", "id": "1328" }, { "date": "2000-08-14T00:00:00", "db": "BID", "id": "1578" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2000-000057" }, { "date": "2005-10-12T00:00:00", "db": "CNNVD", "id": "CNNVD-200010-019" }, { "date": "2023-11-07T01:55:24.597000", "db": "NVD", "id": "CVE-2000-0778" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "1328" }, { "db": "BID", "id": "1578" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Microsoft IIS Vulnerabilities in source file information disclosure", "sources": [ { "db": "JVNDB", "id": "JVNDB-2000-000057" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "unknown", "sources": [ { "db": "CNNVD", "id": "CNNVD-200010-019" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.