var-200403-0025
Vulnerability from variot
Multiple format string vulnerabilities in HTTP Application Intelligence (AI) component in Check Point Firewall-1 NG-AI R55 and R54, and Check Point Firewall-1 HTTP Security Server included with NG FP1, FP2, and FP3 allows remote attackers to execute arbitrary code via HTTP requests that cause format string specifiers to be used in an error message, as demonstrated using the scheme of a URI. Several versions of Check Point Firewall-1 contain a vulnerability that allows remote attackers to execute arbitrary code with administrative privileges. Check Point Firewall-1 is a high-performance firewall. An unsuccessful attack will destroy all connected HTTP sessions and stop WEB communication. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
HTTP Parsing Vulnerabilities in Check Point Firewall-1
Original release date: February 05, 2004 Last revised: -- Source: US-CERT
A complete revision history can be found at the end of this file. This allows the attacker to take control of the firewall, and in some cases, to also control the server it runs on.
I. Description
The Application Intelligence (AI) component of Check Point Firewall-1 is an application proxy that scans traffic for application layer attacks once it has passed through the firewall at the network level. Earlier versions of Firewall-1 include the HTTP Security Server, which provides similar functionality. When Firewall-1 generates an error message in response to the invalid request, a portion of the input supplied by the attacker is included in the format string for a call to sprintf().
Researchers at Internet Security Systems have determined that it is possible to exploit this format string vulnerability to execute commands on the firewall. For more information, please see the ISS advisory at:
http://xforce.iss.net/xforce/alerts/id/162
The CERT/CC is tracking this issue as VU#790771. This reference number corresponds to CVE candidate CAN-2004-0039.
II. Failed attempts to exploit this vulnerability may cause the firewall to crash.
III. It is unclear at this time whether there are other attack vectors that may still allow exploitation of the underlying software defect. Therefore, affected sites may be able to limit their exposure to this vulnerability by disabling HTTP Security Servers or the Application Intelligence component, as appropriate. ___________
This vulnerability was discovered and researched by Mark Dowd of ISS X-Force. ___________
This document was written by Jeffrey P. Lanza. ___________
This document is available from: http://www.us-cert.gov/cas/techalerts/TA04-036A.html ___________
Copyright 2004 Carnegie Mellon University.
Revision History Feb 05, 2004: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQFAIsBMXlvNRxAkFWARApI0AKD4vWl9qb4hYtEr+zlkUScaY3PFcwCfRXcG pglRULK2zVbnACsvG9+BEog= =6SAE -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200403-0025", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "firewall-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "*" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "check point", "version": null }, { "model": "vpn-1/firewall-1", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "ng fp2" }, { "model": "vpn-1/firewall-1", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "ng fp3" }, { "model": "vpn-1/firewall-1", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "ng with application intelligence" }, { "model": "vpn-1/firewall-1", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "ng with application intelligence (r55)" }, { "model": "firewall-1", "scope": null, "trust": 0.6, "vendor": "checkpoint", "version": null }, { "model": "point software nokia voyager", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software ng-ai r55", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software ng-ai r54", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software ng-ai", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp3 hf2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp3 hf1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp3", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 sp6", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp5", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" } ], "sources": [ { "db": "CERT/CC", "id": "VU#790771" }, { "db": "BID", "id": "9581" }, { "db": "JVNDB", "id": "JVNDB-2004-000032" }, { "db": "CNNVD", "id": "CNNVD-200403-032" }, { "db": "NVD", "id": "CVE-2004-0039" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:checkpoint:vpn-1_firewall-1", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000032" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mark Dowd", "sources": [ { "db": "CNNVD", "id": "CNNVD-200403-032" } ], "trust": 0.6 }, "cve": "CVE-2004-0039", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2004-0039", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-8469", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2004-0039", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#790771", "trust": 0.8, "value": "17.10" }, { "author": "NVD", "id": "CVE-2004-0039", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200403-032", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-8469", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#790771" }, { "db": "VULHUB", "id": "VHN-8469" }, { "db": "JVNDB", "id": "JVNDB-2004-000032" }, { "db": "CNNVD", "id": "CNNVD-200403-032" }, { "db": "NVD", "id": "CVE-2004-0039" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple format string vulnerabilities in HTTP Application Intelligence (AI) component in Check Point Firewall-1 NG-AI R55 and R54, and Check Point Firewall-1 HTTP Security Server included with NG FP1, FP2, and FP3 allows remote attackers to execute arbitrary code via HTTP requests that cause format string specifiers to be used in an error message, as demonstrated using the scheme of a URI. Several versions of Check Point Firewall-1 contain a vulnerability that allows remote attackers to execute arbitrary code with administrative privileges. Check Point Firewall-1 is a high-performance firewall. An unsuccessful attack will destroy all connected HTTP sessions and stop WEB communication. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nHTTP Parsing Vulnerabilities in Check Point Firewall-1\n\n Original release date: February 05, 2004\n Last revised: --\n Source: US-CERT\n\n A complete revision history can be found at the end of this file. This allows the attacker to take control of the firewall,\n and in some cases, to also control the server it runs on. \n\nI. Description\n\n The Application Intelligence (AI) component of Check Point Firewall-1\n is an application proxy that scans traffic for application layer\n attacks once it has passed through the firewall at the network level. \n Earlier versions of Firewall-1 include the HTTP Security Server, which\n provides similar functionality. When Firewall-1 generates an error message in\n response to the invalid request, a portion of the input supplied by the\n attacker is included in the format string for a call to sprintf(). \n\n Researchers at Internet Security Systems have determined that it is\n possible to exploit this format string vulnerability to execute\n commands on the firewall. For more information, please\n see the ISS advisory at:\n\n http://xforce.iss.net/xforce/alerts/id/162\n\n The CERT/CC is tracking this issue as VU#790771. This reference number\n corresponds to CVE candidate CAN-2004-0039. \n\nII. Failed attempts to exploit this vulnerability may cause the\n firewall to crash. \n\nIII. It is unclear at this time whether there\n are other attack vectors that may still allow exploitation of the\n underlying software defect. \n Therefore, affected sites may be able to limit their exposure to this\n vulnerability by disabling HTTP Security Servers or the Application\n Intelligence component, as appropriate. \n _________________________________________________________________\n\n This vulnerability was discovered and researched by Mark Dowd of ISS\n X-Force. \n _________________________________________________________________\n\n This document was written by Jeffrey P. Lanza. \n _________________________________________________________________\n\n This document is available from:\n http://www.us-cert.gov/cas/techalerts/TA04-036A.html\n _________________________________________________________________\n\n Copyright 2004 Carnegie Mellon University. \n\n Revision History\n Feb 05, 2004: Initial release\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niD8DBQFAIsBMXlvNRxAkFWARApI0AKD4vWl9qb4hYtEr+zlkUScaY3PFcwCfRXcG\npglRULK2zVbnACsvG9+BEog=\n=6SAE\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2004-0039" }, { "db": "CERT/CC", "id": "VU#790771" }, { "db": "JVNDB", "id": "JVNDB-2004-000032" }, { "db": "BID", "id": "9581" }, { "db": "VULHUB", "id": "VHN-8469" }, { "db": "PACKETSTORM", "id": "32633" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#790771", "trust": 3.3 }, { "db": "NVD", "id": "CVE-2004-0039", "trust": 2.8 }, { "db": "BID", "id": "9581", "trust": 2.8 }, { "db": "USCERT", "id": "TA04-036A", "trust": 2.6 }, { "db": "XF", "id": "14149", "trust": 2.2 }, { "db": "SECUNIA", "id": "10794", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2004-000032", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200403-032", "trust": 0.7 }, { "db": "CERT/CC", "id": "TA04-036A", "trust": 0.6 }, { "db": "ISS", "id": "20040204 CHECKPOINT FIREWALL-1 HTTP PARSING FORMAT STRING VULNERABILITIES", "trust": 0.6 }, { "db": "XF", "id": "1", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20040205 TWO CHECKPOINT FW-1/VPN-1 VULNS", "trust": 0.6 }, { "db": "CIAC", "id": "O-072", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-8469", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "32633", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#790771" }, { "db": "VULHUB", "id": "VHN-8469" }, { "db": "BID", "id": "9581" }, { "db": "JVNDB", "id": "JVNDB-2004-000032" }, { "db": "PACKETSTORM", "id": "32633" }, { "db": "CNNVD", "id": "CNNVD-200403-032" }, { "db": "NVD", "id": "CVE-2004-0039" } ] }, "id": "VAR-200403-0025", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-8469" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:17:16.944000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "FireWall-1 HTTP Security Server Vulnerability", "trust": 0.8, "url": "http://www.checkpoint.com/services/techsupport/alerts/security_server.html" }, { "title": "FireWall-1 HTTP \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30b5\u30fc\u30d0\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "http://www.checkpoint.co.jp/techsupport/alerts/security_server.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000032" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0039" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.7, "url": "http://xforce.iss.net/xforce/alerts/id/162" }, { "trust": 2.9, "url": "http://www.checkpoint.com/techsupport/alerts/security_server.html" }, { "trust": 2.6, "url": "http://www.us-cert.gov/cas/techalerts/ta04-036a.html" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/9581" }, { "trust": 2.5, "url": "http://www.kb.cert.org/vuls/id/790771" }, { "trust": 2.5, "url": "http://www.ciac.org/ciac/bulletins/o-072.shtml" }, { "trust": 2.2, "url": "http://xforce.iss.net/xforce/xfdb/14149" }, { "trust": 1.2, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=107604682227031\u0026w=2" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14149" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=107604682227031\u0026w=2" }, { "trust": 0.8, "url": "http://www.secunia.com/advisories/10794/" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0039" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2004/wr040601.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta04-036a" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trta04-036a" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0039" }, { "trust": 0.8, "url": "http://www.isskk.co.jp/support/techinfo/general/checkpoint_fw1_162.html" }, { "trust": 0.3, "url": "http://www.checkpoint.com/techsupport/" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=107604682227031\u0026amp;w=2" } ], "sources": [ { "db": "CERT/CC", "id": "VU#790771" }, { "db": "VULHUB", "id": "VHN-8469" }, { "db": "BID", "id": "9581" }, { "db": "JVNDB", "id": "JVNDB-2004-000032" }, { "db": "PACKETSTORM", "id": "32633" }, { "db": "CNNVD", "id": "CNNVD-200403-032" }, { "db": "NVD", "id": "CVE-2004-0039" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#790771" }, { "db": "VULHUB", "id": "VHN-8469" }, { "db": "BID", "id": "9581" }, { "db": "JVNDB", "id": "JVNDB-2004-000032" }, { "db": "PACKETSTORM", "id": "32633" }, { "db": "CNNVD", "id": "CNNVD-200403-032" }, { "db": "NVD", "id": "CVE-2004-0039" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-02-05T00:00:00", "db": "CERT/CC", "id": "VU#790771" }, { "date": "2004-03-03T00:00:00", "db": "VULHUB", "id": "VHN-8469" }, { "date": "2004-02-05T00:00:00", "db": "BID", "id": "9581" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000032" }, { "date": "2004-02-06T00:08:00", "db": "PACKETSTORM", "id": "32633" }, { "date": "2004-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200403-032" }, { "date": "2004-03-03T05:00:00", "db": "NVD", "id": "CVE-2004-0039" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-04-23T00:00:00", "db": "CERT/CC", "id": "VU#790771" }, { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-8469" }, { "date": "2009-07-12T02:06:00", "db": "BID", "id": "9581" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000032" }, { "date": "2006-01-03T00:00:00", "db": "CNNVD", "id": "CNNVD-200403-032" }, { "date": "2017-07-11T01:29:52.557000", "db": "NVD", "id": "CVE-2004-0039" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "32633" }, { "db": "CNNVD", "id": "CNNVD-200403-032" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HTTP Parsing Vulnerabilities in Check Point Firewall-1", "sources": [ { "db": "CERT/CC", "id": "VU#790771" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-200403-032" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.