var-202004-1529
Vulnerability from variot
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D8500 before 1.0.3.42, EX3700 before 1.0.0.70, EX3800 before 1.0.0.70, EX6000 before 1.0.0.30, EX6100 before 1.0.2.24, EX6120 before 1.0.0.40, EX6130 before 1.0.0.22, EX6150 before 1.0.0.42, EX6200 before 1.0.3.88, EX7000 before 1.0.0.66, R6250 before 1.0.4.26, R6300-2CXNAS before 1.0.3.60, R6300v2 before 1.0.4.28, R6400 before 1.0.1.36, R6400v2 before 1.0.2.52, R6700 before 1.0.1.46, R6900 before 1.0.1.46, R7000 before 1.0.9.28, R7000P before 1.3.1.44, R6900P before 1.3.1.44, R7100LG before 1.0.0.46, R7300 before 1.0.0.68, R7900 before 1.0.2.10, R8000 before 1.0.4.18, R8000P before 1.3.0.10, R7900P before 1.3.0.10, R8500 before 1.0.2.122, R8300 before 1.0.2.122, RBW30 before 2.1.2.6, WN2500RPv2 before 1.0.0.54, and WNR3500Lv2 before 1.2.0.56. plural NETGEAR The device is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR D8500, etc. are all products of NETGEAR. NETGEAR D8500 is a wireless modem. WNR3500L is a wireless router. NETGEAR EX3700 is a wireless network signal extender. The vulnerability stems from the fact that the network system or product performs an operation on the memory, and the data boundary is not correctly verified, resulting in an incorrect read and write operation to other associated memory locations. This affects D8500 prior to 1.0.3.42, EX3700 prior to 1.0.0.70, EX3800 prior to 1.0.0.70, EX6000 prior to 1.0.0.30, EX6100 prior to 1.0.2.24, EX6120 prior to 1.0.0.40, EX6130 prior to 1.0.0.22, EX6150 prior to 1.0.0.42, EX6200 prior to 1.0.3.88, EX7000 prior to 1.0.0.66, R6250 prior to 1.0.4.26, R6300-2CXNAS prior to 1.0.3.60, R6300v2 prior to 1.0.4.28, R6400 prior to 1.0.1.36, R6400v2 prior to 1.0.2.52, R6700 prior to 1.0.1.46, R6900 prior to 1.0.1.46, R7000 prior to 1.0.9.28, R7000P prior to 1.3.1.44, R6900P prior to 1.3.1.44, R7100LG prior to 1.0.0.46, R7300 prior to 1.0.0.68, R7900 prior to 1.0.2.10, R8000 prior to 1.0.4.18, R8000P prior to 1.3.0.10, R7900P prior to 1.3.0.10, R8500 prior to 1.0.2.122, R8300 prior to 1.0.2.122, RBW30 prior to 2.1.2.6, WN2500RPv2 prior to 1.0.0.54, and WNR3500Lv2 prior to 1.2.0.56
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1529", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "d8500", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.3.42", }, { model: "ex3700", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.0.70", }, { model: "ex3800", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.0.70", }, { model: "ex6000", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.0.30", }, { model: "ex6100", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.2.24", }, { model: "ex6120", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.0.40", }, { model: "ex6130", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.0.22", }, { model: "ex6150", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.0.42", }, { model: "ex6200", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.3.88", }, { model: "ex7000", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.0.66", }, { model: "r6250", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.4.26", }, { model: "r6300-2cxnas", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.3.60", }, { model: "r6400", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.1.36", }, { model: "r6700", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.1.46", }, { model: "r6900", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.1.46", }, { model: "r7000", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.9.28", }, { model: "r7000p", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.3.1.44", }, { model: "r6900p", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.3.1.44", }, { model: "r7100lg", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.0.46", }, { model: "r7300", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.0.68", }, { model: "r7900", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.2.10", }, { model: "r8000", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.4.18", }, { model: "r8000p", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.3.0.10", }, { model: "r7900p", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.3.0.10", }, { model: "r8500", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.2.122", }, { model: "r8300", scope: "lt", trust: 1.6, vendor: "netgear", version: "1.0.2.122", }, { model: "rbw30", scope: "lt", trust: 1.6, vendor: "netgear", version: "2.1.2.6", }, { model: "wnr3500l", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.56", }, { model: "r6400", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.52", }, { model: "r6300", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.4.28", }, { model: "wn2500rp", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.54", }, { model: "d8500", scope: "eq", trust: 0.8, vendor: "netgear", version: "1.0.3.42", }, { model: "ex3700", scope: "eq", trust: 0.8, vendor: "netgear", version: "1.0.0.70", }, { model: "ex3800", scope: "eq", trust: 0.8, vendor: "netgear", version: "1.0.0.70", }, { model: "ex6000", scope: "eq", trust: 0.8, vendor: "netgear", version: "1.0.0.30", }, { model: "ex6100", scope: "eq", trust: 0.8, vendor: "netgear", version: "1.0.2.24", }, { model: "ex6120", scope: "eq", trust: 0.8, vendor: "netgear", version: "1.0.0.40", }, { model: "ex6130", scope: "eq", trust: 0.8, vendor: "netgear", version: "1.0.0.22", }, { model: "ex6150", scope: "eq", trust: 0.8, vendor: "netgear", version: "1.0.0.42", }, { model: "ex6200", scope: "eq", trust: 0.8, vendor: "netgear", version: "1.0.3.88", }, { model: "ex7000", scope: "eq", trust: 0.8, vendor: "netgear", version: "1.0.0.66", }, { model: "r6300v2", scope: "lt", trust: 0.6, vendor: "netgear", version: "1.0.4.28", }, { model: "r6400v2", scope: "lt", trust: 0.6, vendor: "netgear", version: "1.0.2.52", }, { model: "wnr3500lv2", scope: "lt", trust: 0.6, vendor: "netgear", version: "1.2.0.56", }, { model: "wn2500rpv2", scope: "lt", trust: 0.6, vendor: "netgear", version: "1.0.0.54", }, { model: "d8500", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "d8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.27", }, { model: "d8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.28", }, { model: "d8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.29", }, { model: "d8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.35", }, { model: "d8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.36", }, { model: "d8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.39", }, { model: "ex3700", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "ex3700", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.64", }, { model: "ex3700", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.66", }, { model: "ex3800", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "ex3800", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.64", }, { model: "ex3800", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.66", }, { model: "ex6000", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "ex6000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.24", }, { model: "ex6100", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.50", }, { model: "ex6100", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.54", }, { model: "ex6100", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.60", }, { model: "ex6100", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.70", }, { model: "ex6100", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.76", }, { model: "ex6100", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.16 1.1.130", }, { model: "ex6100", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.18", }, { model: "ex6100", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.20", }, { model: "ex6100", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.22", }, { model: "ex6120", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "ex6120", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.32", }, { model: "ex6120", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.34", }, { model: "ex6130", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "ex6130", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.16", }, { model: "ex6150", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "ex6150", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.34 1.0.70", }, { model: "ex6150", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.36", }, { model: "ex6150", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.38", }, { model: "ex6200", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.44", }, { model: "ex6200", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.50", }, { model: "ex6200", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.52", }, { model: "ex6200", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.56", }, { model: "ex6200", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.62", }, { model: "ex6200", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.64", }, { model: "ex6200", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.72", }, { model: "ex6200", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.74", }, { model: "ex6200", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.82 1.1.117", }, { model: "ex6200", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.84", }, { model: "ex6200", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.86", }, { model: "ex7000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.50", }, { model: "ex7000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.56", }, { model: "ex7000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.60", }, { model: "ex7000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.64", }, { model: "r6250", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r6250", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.6 10.1.12", }, { model: "r6250", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.8", }, { model: "r6250", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.12", }, { model: "r6250", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.14", }, { model: "r6250", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.16", }, { model: "r6250", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.20", }, { model: "r6300", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r6300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.36", }, { model: "r6300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.06", }, { model: "r6300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.6", }, { model: "r6300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.8", }, { model: "r6300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.8 10.0.77", }, { model: "r6300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.12", }, { model: "r6300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.18", }, { model: "r6300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.22", }, { model: "r6300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.24", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.12", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.14", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.18", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.20", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.24", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.32", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.36", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.42", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.44", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.46", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.18", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.30", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.32", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.34", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.44", }, { model: "r6400", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.46", }, { model: "r6700", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r6700", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.14", }, { model: "r6700", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.16", }, { model: "r6700", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.20", }, { model: "r6700", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.22", }, { model: "r6700", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.26", }, { model: "r6700", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.30", }, { model: "r6700", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.36", }, { model: "r6700", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.44", }, { model: "r6900", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r6900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.14", }, { model: "r6900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.16", }, { model: "r6900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.20", }, { model: "r6900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.22", }, { model: "r6900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.26", }, { model: "r6900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.28", }, { model: "r6900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.30", }, { model: "r6900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.34", }, { model: "r6900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.44", }, { model: "r6900p", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r6900p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.56", }, { model: "r6900p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.58", }, { model: "r6900p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.62", }, { model: "r6900p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.16", }, { model: "r6900p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.2.0.22", }, { model: "r6900p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.3.0.8", }, { model: "r6900p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.3.0.18", }, { model: "r6900p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.3.0.20", }, { model: "r6900p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.3.1.26", }, { model: "r7000", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r7000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.7.2 1.1.93", }, { model: "r7000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.7.10", }, { model: "r7000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.9.4", }, { model: "r7000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.9.6", }, { model: "r7000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.9.10", }, { model: "r7000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.9.12", }, { model: "r7000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.9.14", }, { model: "r7000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.9.18", }, { model: "r7000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.9.26", }, { model: "r7000p", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r7000p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.56", }, { model: "r7000p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.58", }, { model: "r7000p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.62", }, { model: "r7000p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.86", }, { model: "r7000p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.16", }, { model: "r7000p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.2.0.22", }, { model: "r7000p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.3.0.8", }, { model: "r7000p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.3.0.18", }, { model: "r7000p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.3.0.20", }, { model: "r7000p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.3.1.26", }, { model: "r7100lg", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r7100lg", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.28", }, { model: "r7100lg", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.30", }, { model: "r7100lg", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.32", }, { model: "r7100lg", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.34", }, { model: "r7100lg", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.40", }, { model: "r7100lg", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.42", }, { model: "r7300", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r7300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.52", }, { model: "r7300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.54", }, { model: "r7300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.0.56", }, { model: "r7900", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r7900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.8", }, { model: "r7900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.12", }, { model: "r7900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.14", }, { model: "r7900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.16", }, { model: "r7900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.18", }, { model: "r7900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.1.26", }, { model: "r7900", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.4", }, { model: "r7900p", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r7900p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.1.4.6", }, { model: "r7900p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.1.5.14", }, { model: "r8000", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r8000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.22", }, { model: "r8000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.24", }, { model: "r8000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.26", }, { model: "r8000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.32", }, { model: "r8000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.36", }, { model: "r8000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.44", }, { model: "r8000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.46", }, { model: "r8000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.48", }, { model: "r8000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.3.54", }, { model: "r8000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.2", }, { model: "r8000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.4", }, { model: "r8000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.4 1.1.42", }, { model: "r8000", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.4.12", }, { model: "r8000p", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r8000p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.1.4.6", }, { model: "r8000p", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.1.5.14", }, { model: "r8300", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r8300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.74", }, { model: "r8300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.86", }, { model: "r8300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.94", }, { model: "r8300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.100 1.0.82", }, { model: "r8300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.104", }, { model: "r8300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.106", }, { model: "r8300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.110", }, { model: "r8300", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.116", }, { model: "r8500", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "r8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.74", }, { model: "r8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.86", }, { model: "r8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.94", }, { model: "r8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.100", }, { model: "r8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.100 1.0.82", }, { model: "r8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.104", }, { model: "r8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.106", }, { model: "r8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.110", }, { model: "r8500", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.0.2.116", }, { model: "wnr3500l", scope: "eq", trust: 0.1, vendor: "netgear", version: null, }, { model: "wnr3500l", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.2.0.40", }, { model: "wnr3500l", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.2.0.44", }, { model: "wnr3500l", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.2.0.46", }, { model: "wnr3500l", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.2.0.48", }, { model: "wnr3500l", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.2.0.50", }, { model: "wnr3500l", scope: "eq", trust: 0.1, vendor: "netgear", version: "1.2.0.54", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-28136", }, { db: "VULMON", id: "CVE-2018-21093", }, { db: "JVNDB", id: "JVNDB-2018-016404", }, { db: "NVD", id: "CVE-2018-21093", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { cpe_match: [ { cpe22Uri: "cpe:/o:netgear:d8500_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:netgear:ex3700_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:netgear:ex3800_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:netgear:ex6000_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:netgear:ex6100_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:netgear:ex6120_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:netgear:ex6130_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:netgear:ex6150_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:netgear:ex6200_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:netgear:ex7000_firmware", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2018-016404", }, ], }, cve: "CVE-2018-21093", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 6.5, id: "CVE-2018-21093", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 1.1, vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Adjacent Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 5.8, confidentialityImpact: "Partial", exploitabilityScore: null, id: "JVNDB-2018-016404", impactScore: null, integrityImpact: "Partial", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 6.5, id: "CNVD-2020-28136", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.6, vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "ADJACENT", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 2.8, id: "CVE-2018-21093", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "LOW", attackVector: "ADJACENT", author: "cve@mitre.org", availabilityImpact: "LOW", baseScore: 6.4, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", exploitabilityScore: 0.9, id: "CVE-2018-21093", impactScore: 5.5, integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", version: "3.0", }, { attackComplexity: "Low", attackVector: "Adjacent Network", author: "NVD", availabilityImpact: "High", baseScore: 8.8, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "JVNDB-2018-016404", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2018-21093", trust: 1, value: "HIGH", }, { author: "cve@mitre.org", id: "CVE-2018-21093", trust: 1, value: "MEDIUM", }, { author: "NVD", id: "JVNDB-2018-016404", trust: 0.8, value: "High", }, { author: "CNVD", id: "CNVD-2020-28136", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-202004-2172", trust: 0.6, value: "HIGH", }, { author: "VULMON", id: "CVE-2018-21093", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2020-28136", }, { db: "VULMON", id: "CVE-2018-21093", }, { db: "JVNDB", id: "JVNDB-2018-016404", }, { db: "CNNVD", id: "CNNVD-202004-2172", }, { db: "NVD", id: "CVE-2018-21093", }, { db: "NVD", id: "CVE-2018-21093", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D8500 before 1.0.3.42, EX3700 before 1.0.0.70, EX3800 before 1.0.0.70, EX6000 before 1.0.0.30, EX6100 before 1.0.2.24, EX6120 before 1.0.0.40, EX6130 before 1.0.0.22, EX6150 before 1.0.0.42, EX6200 before 1.0.3.88, EX7000 before 1.0.0.66, R6250 before 1.0.4.26, R6300-2CXNAS before 1.0.3.60, R6300v2 before 1.0.4.28, R6400 before 1.0.1.36, R6400v2 before 1.0.2.52, R6700 before 1.0.1.46, R6900 before 1.0.1.46, R7000 before 1.0.9.28, R7000P before 1.3.1.44, R6900P before 1.3.1.44, R7100LG before 1.0.0.46, R7300 before 1.0.0.68, R7900 before 1.0.2.10, R8000 before 1.0.4.18, R8000P before 1.3.0.10, R7900P before 1.3.0.10, R8500 before 1.0.2.122, R8300 before 1.0.2.122, RBW30 before 2.1.2.6, WN2500RPv2 before 1.0.0.54, and WNR3500Lv2 before 1.2.0.56. plural NETGEAR The device is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR D8500, etc. are all products of NETGEAR. NETGEAR D8500 is a wireless modem. WNR3500L is a wireless router. NETGEAR EX3700 is a wireless network signal extender. The vulnerability stems from the fact that the network system or product performs an operation on the memory, and the data boundary is not correctly verified, resulting in an incorrect read and write operation to other associated memory locations. This affects D8500 prior to 1.0.3.42, EX3700 prior to 1.0.0.70, EX3800 prior to 1.0.0.70, EX6000 prior to 1.0.0.30, EX6100 prior to 1.0.2.24, EX6120 prior to 1.0.0.40, EX6130 prior to 1.0.0.22, EX6150 prior to 1.0.0.42, EX6200 prior to 1.0.3.88, EX7000 prior to 1.0.0.66, R6250 prior to 1.0.4.26, R6300-2CXNAS prior to 1.0.3.60, R6300v2 prior to 1.0.4.28, R6400 prior to 1.0.1.36, R6400v2 prior to 1.0.2.52, R6700 prior to 1.0.1.46, R6900 prior to 1.0.1.46, R7000 prior to 1.0.9.28, R7000P prior to 1.3.1.44, R6900P prior to 1.3.1.44, R7100LG prior to 1.0.0.46, R7300 prior to 1.0.0.68, R7900 prior to 1.0.2.10, R8000 prior to 1.0.4.18, R8000P prior to 1.3.0.10, R7900P prior to 1.3.0.10, R8500 prior to 1.0.2.122, R8300 prior to 1.0.2.122, RBW30 prior to 2.1.2.6, WN2500RPv2 prior to 1.0.0.54, and WNR3500Lv2 prior to 1.2.0.56", sources: [ { db: "NVD", id: "CVE-2018-21093", }, { db: "JVNDB", id: "JVNDB-2018-016404", }, { db: "CNVD", id: "CNVD-2020-28136", }, { db: "VULMON", id: "CVE-2018-21093", }, ], trust: 2.25, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2018-21093", trust: 3.1, }, { db: "JVNDB", id: "JVNDB-2018-016404", trust: 0.8, }, { db: "CNVD", id: "CNVD-2020-28136", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202004-2172", trust: 0.6, }, { db: "VULMON", id: "CVE-2018-21093", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-28136", }, { db: "VULMON", id: "CVE-2018-21093", }, { db: "JVNDB", id: "JVNDB-2018-016404", }, { db: "CNNVD", id: "CNNVD-202004-2172", }, { db: "NVD", id: "CVE-2018-21093", }, ], }, id: "VAR-202004-1529", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2020-28136", }, ], trust: 1.0544298218333332, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-28136", }, ], }, last_update_date: "2024-11-23T22:25:32.440000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Security Advisory for Pre-Authentication Stack Overflow on Some Routers, Modem Routers, Wireless Extenders, and Orbi Satellites, PSV-2017-2011", trust: 0.8, url: "https://kb.netgear.com/000060456/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-Modem-Routers-Wireless-Extenders-and-Orbi-Satellites-PSV-2017-2011", }, { title: "Patch for Multiple NETGEAR product buffer overflow vulnerabilities (CNVD-2020-28136)", trust: 0.6, url: "https://www.cnvd.org.cn/patchInfo/show/217433", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-28136", }, { db: "JVNDB", id: "JVNDB-2018-016404", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-787", trust: 1.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2018-016404", }, { db: "NVD", id: "CVE-2018-21093", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2, url: "https://nvd.nist.gov/vuln/detail/cve-2018-21093", }, { trust: 1.7, url: "https://kb.netgear.com/000060456/security-advisory-for-pre-authentication-stack-overflow-on-some-routers-modem-routers-wireless-extenders-and-orbi-satellites-psv-2017-2011", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-21093", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/787.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-28136", }, { db: "VULMON", id: "CVE-2018-21093", }, { db: "JVNDB", id: "JVNDB-2018-016404", }, { db: "CNNVD", id: "CNNVD-202004-2172", }, { db: "NVD", id: "CVE-2018-21093", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2020-28136", }, { db: "VULMON", id: "CVE-2018-21093", }, { db: "JVNDB", id: "JVNDB-2018-016404", }, { db: "CNNVD", id: "CNNVD-202004-2172", }, { db: "NVD", id: "CVE-2018-21093", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-05-14T00:00:00", db: "CNVD", id: "CNVD-2020-28136", }, { date: "2020-04-27T00:00:00", db: "VULMON", id: "CVE-2018-21093", }, { date: "2020-06-02T00:00:00", db: "JVNDB", id: "JVNDB-2018-016404", }, { date: "2020-04-27T00:00:00", db: "CNNVD", id: "CNNVD-202004-2172", }, { date: "2020-04-27T15:15:12.080000", db: "NVD", id: "CVE-2018-21093", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-05-14T00:00:00", db: "CNVD", id: "CNVD-2020-28136", }, { date: "2020-05-04T00:00:00", db: "VULMON", id: "CVE-2018-21093", }, { date: "2020-06-02T00:00:00", db: "JVNDB", id: "JVNDB-2018-016404", }, { date: "2020-05-06T00:00:00", db: "CNNVD", id: "CNNVD-202004-2172", }, { date: "2024-11-21T04:02:53.023000", db: "NVD", id: "CVE-2018-21093", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote or local", sources: [ { db: "CNNVD", id: "CNNVD-202004-2172", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural NETGEAR Out-of-bounds write vulnerabilities in devices", sources: [ { db: "JVNDB", id: "JVNDB-2018-016404", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer error", sources: [ { db: "CNNVD", id: "CNNVD-202004-2172", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.