var-201709-1051
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in the "advanced settings - time server" module in Wibu-Systems CodeMeter before 6.50b allows remote attackers to inject arbitrary web script or HTML via the "server name" field in actions/ChangeConfiguration.html. Wibu-Systems CodeMeter Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Wibu-Systems CodeMeter is a suite of anti-piracy protection products from Wibu-Systems, Germany for software protection against piracy and unsecure software. The product uses encryption technology and a small USB hardware device, CmStick, which has a 128KB secure amount of SmartCard chip for storing license and license related data. Wibu-Systems CodeMeter is prone to a cross-site scripting vulnerability because it fails to properly handle user-supplied input. An attacker can leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could allow the attacker to steal cookie-based authentication credentials and launch other attacks. Versions prior to CodeMeter 6.50b are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201709-1051", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "codemeter", "scope": "lte", "trust": 1.0, "vendor": "wibu", "version": "6.50a" }, { "model": "codemeter", "scope": "lt", "trust": 0.8, "vendor": "wibu", "version": "6.50b" }, { "model": "codemeter \u003c6.50b", "scope": null, "trust": 0.6, "vendor": "wibu", "version": null }, { "model": "codemeter", "scope": "eq", "trust": 0.6, "vendor": "wibu", "version": "6.50a" }, { "model": "codemeter 6.50a", "scope": null, "trust": 0.3, "vendor": "wibu", "version": null }, { "model": "codemeter 4.50b", "scope": null, "trust": 0.3, "vendor": "wibu", "version": null }, { "model": "codemeter", "scope": "eq", "trust": 0.3, "vendor": "wibu", "version": "4.40" }, { "model": "codemeter 4.30d", "scope": null, "trust": 0.3, "vendor": "wibu", "version": null }, { "model": "codemeter 4.30c", "scope": null, "trust": 0.3, "vendor": "wibu", "version": null }, { "model": "codemeter 4.20b", "scope": null, "trust": 0.3, "vendor": "wibu", "version": null }, { "model": "automation studio view designer", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "50000" }, { "model": "automation studio logix emulate", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "50000" }, { "model": "automation studio logix designer", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "50000" }, { "model": "automation studio architect", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "50000" }, { "model": "automation softlogix", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "58000" }, { "model": "automation rsview32", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation rslogix5", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation rslogix emulate", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "50000" }, { "model": "automation rslogix", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "5000" }, { "model": "automation rslinx classic", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation rsfieldbus", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk viewpoint", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk view site edition", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk view machine edition", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk vantagepoint", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk transaction manager", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk metrics", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk information server", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk historian site edition", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk historian classic", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk gateway", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk eprocedure", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk energymetrix", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk batch", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk assetcentre", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation factorytalk activation manager", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "4.01" }, { "model": "automation factorytalk activation manager", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "4.00" }, { "model": "automation factorytalk activation manager", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "3.40" }, { "model": "automation emonitor", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation arena", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "rsnetworx", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "0" }, { "model": "automation rslogix", "scope": "eq", "trust": 0.3, "vendor": "rockwall", "version": "50000" }, { "model": "codemeter 6.50b", "scope": "ne", "trust": 0.3, "vendor": "wibu", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "codemeter", "version": "*" } ], "sources": [ { "db": "IVD", "id": "05bed560-8aa3-476d-a0cb-40b1fdd83a18" }, { "db": "CNVD", "id": "CNVD-2017-32459" }, { "db": "BID", "id": "104433" }, { "db": "JVNDB", "id": "JVNDB-2017-007768" }, { "db": "CNNVD", "id": "CNNVD-201709-058" }, { "db": "NVD", "id": "CVE-2017-13754" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wibu:codemeter", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007768" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rockwell Automation", "sources": [ { "db": "BID", "id": "104433" } ], "trust": 0.3 }, "cve": "CVE-2017-13754", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "exploitabilityScore": 6.8, "id": "CVE-2017-13754", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2017-32459", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "05bed560-8aa3-476d-a0cb-40b1fdd83a18", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.3, "id": "CVE-2017-13754", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-13754", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2017-13754", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2017-32459", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201709-058", "trust": 0.6, "value": "LOW" }, { "author": "IVD", "id": "05bed560-8aa3-476d-a0cb-40b1fdd83a18", "trust": 0.2, "value": "LOW" } ] } ], "sources": [ { "db": "IVD", "id": "05bed560-8aa3-476d-a0cb-40b1fdd83a18" }, { "db": "CNVD", "id": "CNVD-2017-32459" }, { "db": "JVNDB", "id": "JVNDB-2017-007768" }, { "db": "CNNVD", "id": "CNNVD-201709-058" }, { "db": "NVD", "id": "CVE-2017-13754" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in the \"advanced settings - time server\" module in Wibu-Systems CodeMeter before 6.50b allows remote attackers to inject arbitrary web script or HTML via the \"server name\" field in actions/ChangeConfiguration.html. Wibu-Systems CodeMeter Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Wibu-Systems CodeMeter is a suite of anti-piracy protection products from Wibu-Systems, Germany for software protection against piracy and unsecure software. The product uses encryption technology and a small USB hardware device, CmStick, which has a 128KB secure amount of SmartCard chip for storing license and license related data. Wibu-Systems CodeMeter is prone to a cross-site scripting vulnerability because it fails to properly handle user-supplied input. \nAn attacker can leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could allow the attacker to steal cookie-based authentication credentials and launch other attacks. \nVersions prior to CodeMeter 6.50b are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2017-13754" }, { "db": "JVNDB", "id": "JVNDB-2017-007768" }, { "db": "CNVD", "id": "CNVD-2017-32459" }, { "db": "BID", "id": "104433" }, { "db": "IVD", "id": "05bed560-8aa3-476d-a0cb-40b1fdd83a18" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-13754", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-18-102-02", "trust": 2.1 }, { "db": "BID", "id": "104433", "trust": 1.3 }, { "db": "EXPLOIT-DB", "id": "42610", "trust": 1.0 }, { "db": "CNVD", "id": "CNVD-2017-32459", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201709-058", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-007768", "trust": 0.8 }, { "db": "EXPLOITDB", "id": "42610", "trust": 0.6 }, { "db": "IVD", "id": "05BED560-8AA3-476D-A0CB-40B1FDD83A18", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "05bed560-8aa3-476d-a0cb-40b1fdd83a18" }, { "db": "CNVD", "id": "CNVD-2017-32459" }, { "db": "BID", "id": "104433" }, { "db": "JVNDB", "id": "JVNDB-2017-007768" }, { "db": "CNNVD", "id": "CNNVD-201709-058" }, { "db": "NVD", "id": "CVE-2017-13754" } ] }, "id": "VAR-201709-1051", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "05bed560-8aa3-476d-a0cb-40b1fdd83a18" }, { "db": "CNVD", "id": "CNVD-2017-32459" } ], "trust": 1.5143525757142857 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "05bed560-8aa3-476d-a0cb-40b1fdd83a18" }, { "db": "CNVD", "id": "CNVD-2017-32459" } ] }, "last_update_date": "2024-11-23T22:22:47.059000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CodeMeter", "trust": 0.8, "url": "http://www.wibu.com/codemeter.html" }, { "title": "Patch for Wibu-Systems CodeMeter Cross-Site Scripting Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/105240" }, { "title": "Wibu-Systems CodeMeter Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74525" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-32459" }, { "db": "JVNDB", "id": "JVNDB-2017-007768" }, { "db": "CNNVD", "id": "CNNVD-201709-058" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007768" }, { "db": "NVD", "id": "CVE-2017-13754" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://www.vulnerability-lab.com/get_content.php?id=2074" }, { "trust": 1.6, "url": "http://seclists.org/fulldisclosure/2017/sep/1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13754" }, { "trust": 1.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-102-02" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/541119/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/104433" }, { "trust": 1.0, "url": "https://www.exploit-db.com/exploits/42610/" }, { "trust": 1.0, "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1073133" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13754" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ics/advisories/icsa-18-102-02" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/541119/100/0/threaded" }, { "trust": 0.3, "url": "http://www.rockwellautomation.com/" }, { "trust": 0.3, "url": "http://www.wibu.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-32459" }, { "db": "BID", "id": "104433" }, { "db": "JVNDB", "id": "JVNDB-2017-007768" }, { "db": "CNNVD", "id": "CNNVD-201709-058" }, { "db": "NVD", "id": "CVE-2017-13754" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "05bed560-8aa3-476d-a0cb-40b1fdd83a18" }, { "db": "CNVD", "id": "CNVD-2017-32459" }, { "db": "BID", "id": "104433" }, { "db": "JVNDB", "id": "JVNDB-2017-007768" }, { "db": "CNNVD", "id": "CNNVD-201709-058" }, { "db": "NVD", "id": "CVE-2017-13754" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-02T00:00:00", "db": "IVD", "id": "05bed560-8aa3-476d-a0cb-40b1fdd83a18" }, { "date": "2017-11-02T00:00:00", "db": "CNVD", "id": "CNVD-2017-32459" }, { "date": "2018-05-10T00:00:00", "db": "BID", "id": "104433" }, { "date": "2017-10-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-007768" }, { "date": "2017-08-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-058" }, { "date": "2017-09-07T13:29:00.620000", "db": "NVD", "id": "CVE-2017-13754" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-02T00:00:00", "db": "CNVD", "id": "CNVD-2017-32459" }, { "date": "2018-05-10T00:00:00", "db": "BID", "id": "104433" }, { "date": "2019-07-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-007768" }, { "date": "2017-09-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-058" }, { "date": "2024-11-21T03:11:35.880000", "db": "NVD", "id": "CVE-2017-13754" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-058" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Wibu-Systems CodeMeter Cross-Site Scripting Vulnerability", "sources": [ { "db": "IVD", "id": "05bed560-8aa3-476d-a0cb-40b1fdd83a18" }, { "db": "CNVD", "id": "CNVD-2017-32459" }, { "db": "CNNVD", "id": "CNNVD-201709-058" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-058" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.