var-200709-0084
Vulnerability from variot
Argument injection vulnerability in Apple QuickTime 7.1.5 and earlier, when running on systems with Mozilla Firefox before 2.0.0.7 installed, allows remote attackers to execute arbitrary commands via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter containing the Firefox "-chrome" argument. NOTE: this is a related issue to CVE-2006-4965 and the result of an incomplete fix for CVE-2007-3670. QuickTime Player is prone to a remote security vulnerability. Apple QuickTime has an Argument Injection vulnerability.
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors.
Download the free PSI BETA from the Secunia website: https://psi.secunia.com/
TITLE: Firefox "-chrome" Parameter Security Issue
SECUNIA ADVISORY ID: SA26881
VERIFY ADVISORY: http://secunia.com/advisories/26881/
CRITICAL: Less critical
IMPACT: System access
WHERE:
From remote
SOFTWARE: Mozilla Firefox 2.0.x http://secunia.com/product/12434/ Mozilla Firefox 1.x http://secunia.com/product/4227/
DESCRIPTION: Mozilla has acknowledged a security issue in Firefox, which potentially can be exploited by malicious people to compromise a user's system.
The security issue is caused due to the "-chrome" parameter allowing execution of arbitrary Javascript script code in chrome context. This can be exploited to execute arbitrary commands on a user's system e.g. via applications invoking Firefox with unfiltered command line arguments.
This is related to: SA22048 SA25984
The security issue affects Firefox prior to version 2.0.0.7.
SOLUTION: Update to version 2.0.0.7.
NOTE: Support for Firefox 1.5.0.x has ended June 2007. The vendor encourages users to upgrade to Firefox 2.
ORIGINAL ADVISORY: http://www.mozilla.org/security/announce/2007/mfsa2007-28.html
OTHER REFERENCES: SA22048: http://secunia.com/advisories/22048/
SA25984: http://secunia.com/advisories/25984/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200709-0084", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "quicktime", "scope": "lte", "trust": 1.8, "vendor": "apple", "version": "7.1.5" }, { "model": "firefox", "scope": "lte", "trust": 1.0, "vendor": "mozilla", "version": "2.0.0.6" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mozilla", "version": null }, { "model": "firefox", "scope": "lt", "trust": 0.8, "vendor": "mozilla", "version": "2.0.0.7" }, { "model": "firefox", "scope": "eq", "trust": 0.6, "vendor": "mozilla", "version": "2.0.0.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.6" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.5" } ], "sources": [ { "db": "CERT/CC", "id": "VU#751808" }, { "db": "BID", "id": "85350" }, { "db": "JVNDB", "id": "JVNDB-2007-002675" }, { "db": "CNNVD", "id": "CNNVD-200709-336" }, { "db": "NVD", "id": "CVE-2007-5045" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:mozilla:firefox", "vulnerable": true }, { "cpe22Uri": "cpe:/a:apple:quicktime", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-002675" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "85350" } ], "trust": 0.3 }, "cve": "CVE-2007-5045", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2007-5045", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-28407", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-5045", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#751808", "trust": 0.8, "value": "35.11" }, { "author": "NVD", "id": "CVE-2007-5045", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200709-336", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-28407", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#751808" }, { "db": "VULHUB", "id": "VHN-28407" }, { "db": "JVNDB", "id": "JVNDB-2007-002675" }, { "db": "CNNVD", "id": "CNNVD-200709-336" }, { "db": "NVD", "id": "CVE-2007-5045" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Argument injection vulnerability in Apple QuickTime 7.1.5 and earlier, when running on systems with Mozilla Firefox before 2.0.0.7 installed, allows remote attackers to execute arbitrary commands via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter containing the Firefox \"-chrome\" argument. NOTE: this is a related issue to CVE-2006-4965 and the result of an incomplete fix for CVE-2007-3670. QuickTime Player is prone to a remote security vulnerability. Apple QuickTime has an Argument Injection vulnerability. \n\n----------------------------------------------------------------------\n\nBETA test the new Secunia Personal Software Inspector!\n\nThe Secunia PSI detects installed software on your computer and\ncategorises it as either Insecure, End-of-Life, or Up-To-Date. \nEffectively enabling you to focus your attention on software\ninstallations where more secure versions are available from the\nvendors. \n\nDownload the free PSI BETA from the Secunia website:\nhttps://psi.secunia.com/\n\n----------------------------------------------------------------------\n\nTITLE:\nFirefox \"-chrome\" Parameter Security Issue\n\nSECUNIA ADVISORY ID:\nSA26881\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/26881/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nMozilla Firefox 2.0.x\nhttp://secunia.com/product/12434/\nMozilla Firefox 1.x\nhttp://secunia.com/product/4227/\n\nDESCRIPTION:\nMozilla has acknowledged a security issue in Firefox, which\npotentially can be exploited by malicious people to compromise a\nuser\u0027s system. \n\nThe security issue is caused due to the \"-chrome\" parameter allowing\nexecution of arbitrary Javascript script code in chrome context. This\ncan be exploited to execute arbitrary commands on a user\u0027s system e.g. \nvia applications invoking Firefox with unfiltered command line\narguments. \n\nThis is related to:\nSA22048\nSA25984\n\nThe security issue affects Firefox prior to version 2.0.0.7. \n\nSOLUTION:\nUpdate to version 2.0.0.7. \n\nNOTE: Support for Firefox 1.5.0.x has ended June 2007. The vendor\nencourages users to upgrade to Firefox 2. \n\nORIGINAL ADVISORY:\nhttp://www.mozilla.org/security/announce/2007/mfsa2007-28.html\n\nOTHER REFERENCES:\nSA22048:\nhttp://secunia.com/advisories/22048/\n\nSA25984:\nhttp://secunia.com/advisories/25984/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-5045" }, { "db": "CERT/CC", "id": "VU#751808" }, { "db": "JVNDB", "id": "JVNDB-2007-002675" }, { "db": "BID", "id": "85350" }, { "db": "VULHUB", "id": "VHN-28407" }, { "db": "PACKETSTORM", "id": "59433" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-5045", "trust": 2.8 }, { "db": "SECUNIA", "id": "26881", "trust": 2.6 }, { "db": "VUPEN", "id": "ADV-2007-3197", "trust": 1.7 }, { "db": "CERT/CC", "id": "VU#751808", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2007-002675", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20070912 0DAY: QUICKTIME PWNS FIREFOX", "trust": 0.6 }, { "db": "HP", "id": "SSRT061181", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:5896", "trust": 0.6 }, { "db": "SUNALERT", "id": "201516", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SA:2007:057", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200709-336", "trust": 0.6 }, { "db": "BID", "id": "85350", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-28407", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "59433", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#751808" }, { "db": "VULHUB", "id": "VHN-28407" }, { "db": "BID", "id": "85350" }, { "db": "JVNDB", "id": "JVNDB-2007-002675" }, { "db": "PACKETSTORM", "id": "59433" }, { "db": "CNNVD", "id": "CNNVD-200709-336" }, { "db": "NVD", "id": "CVE-2007-5045" } ] }, "id": "VAR-200709-0084", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-28407" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:40:43.834000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.apple.com/" }, { "title": "Firefox", "trust": 0.8, "url": "http://www.mozilla.org/en-US/firefox/new/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-002675" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-28407" }, { "db": "JVNDB", "id": "JVNDB-2007-002675" }, { "db": "NVD", "id": "CVE-2007-5045" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.mozilla.org/security/announce/2007/mfsa2007-28.html" }, { "trust": 2.8, "url": "http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox" }, { "trust": 2.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c00771742" }, { "trust": 2.0, "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=395942" }, { "trust": 2.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1" }, { "trust": 2.0, "url": "http://www.novell.com/linux/security/advisories/2007_57_mozilla.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/26881" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/479179/100/0/threaded" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5896" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/3197" }, { "trust": 0.9, "url": "http://secunia.com/advisories/26881/" }, { "trust": 0.9, "url": "http://www.securityfocus.com/archive/1/archive/1/479179/100/0/threaded" }, { "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=306560" }, { "trust": 0.8, "url": "http://blog.mozilla.com/security/2007/09/18/firefox-2.0.0.7-now-available/" }, { "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=305149" }, { "trust": 0.8, "url": "http://developer.apple.com/quicktime/quicktimeintro/tools/embed2.html" }, { "trust": 0.8, "url": "http://noscript.net/features#contentblocking" }, { "trust": 0.8, "url": "http://noscript.net" }, { "trust": 0.8, "url": "http://msdn2.microsoft.com/en-us/library/ms647732.aspx" }, { "trust": 0.8, "url": "http://support.microsoft.com/kb/224816" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5045" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-5045" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2007/3197" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5896" }, { "trust": 0.1, "url": "http://secunia.com/product/4227/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/12434/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/22048/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/25984/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" } ], "sources": [ { "db": "CERT/CC", "id": "VU#751808" }, { "db": "VULHUB", "id": "VHN-28407" }, { "db": "BID", "id": "85350" }, { "db": "JVNDB", "id": "JVNDB-2007-002675" }, { "db": "PACKETSTORM", "id": "59433" }, { "db": "CNNVD", "id": "CNNVD-200709-336" }, { "db": "NVD", "id": "CVE-2007-5045" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#751808" }, { "db": "VULHUB", "id": "VHN-28407" }, { "db": "BID", "id": "85350" }, { "db": "JVNDB", "id": "JVNDB-2007-002675" }, { "db": "PACKETSTORM", "id": "59433" }, { "db": "CNNVD", "id": "CNNVD-200709-336" }, { "db": "NVD", "id": "CVE-2007-5045" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-09-13T00:00:00", "db": "CERT/CC", "id": "VU#751808" }, { "date": "2007-09-24T00:00:00", "db": "VULHUB", "id": "VHN-28407" }, { "date": "2007-09-23T00:00:00", "db": "BID", "id": "85350" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-002675" }, { "date": "2007-09-20T08:11:10", "db": "PACKETSTORM", "id": "59433" }, { "date": "2007-09-23T00:00:00", "db": "CNNVD", "id": "CNNVD-200709-336" }, { "date": "2007-09-24T00:17:00", "db": "NVD", "id": "CVE-2007-5045" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-10-04T00:00:00", "db": "CERT/CC", "id": "VU#751808" }, { "date": "2018-10-15T00:00:00", "db": "VULHUB", "id": "VHN-28407" }, { "date": "2007-09-23T00:00:00", "db": "BID", "id": "85350" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-002675" }, { "date": "2009-03-04T00:00:00", "db": "CNNVD", "id": "CNNVD-200709-336" }, { "date": "2024-11-21T00:37:00.810000", "db": "NVD", "id": "CVE-2007-5045" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200709-336" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple QuickTime remote command execution vulnerability", "sources": [ { "db": "CERT/CC", "id": "VU#751808" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-200709-336" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.