fkie_cve-2008-4578
Vulnerability from fkie_nvd
Published
2008-10-15 20:08
Modified
2024-11-21 00:52
Severity ?
Summary
The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
References
secalert@redhat.comhttp://bugs.gentoo.org/show_bug.cgi?id=240409
secalert@redhat.comhttp://secunia.com/advisories/32164Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/33149
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200812-16.xml
secalert@redhat.comhttp://www.dovecot.org/list/dovecot-news/2008-October/000085.htmlPatch
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:232
secalert@redhat.comhttp://www.securityfocus.com/archive/1/498498/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/31587
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/2745
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/45669
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=240409
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32164Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33149
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200812-16.xml
af854a3a-2127-422b-91ae-364da2661108http://www.dovecot.org/list/dovecot-news/2008-October/000085.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:232
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/498498/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31587
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2745
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/45669
Impacted products
Vendor Product Version
dovecot dovecot *
dovecot dovecot 0.99.13
dovecot dovecot 0.99.14
dovecot dovecot 1.0
dovecot dovecot 1.0.2
dovecot dovecot 1.0.3
dovecot dovecot 1.0.4
dovecot dovecot 1.0.5
dovecot dovecot 1.0.6
dovecot dovecot 1.0.7
dovecot dovecot 1.0.8
dovecot dovecot 1.0.9
dovecot dovecot 1.0.10
dovecot dovecot 1.0.12
dovecot dovecot 1.0.beta1
dovecot dovecot 1.0.beta2
dovecot dovecot 1.0.beta3
dovecot dovecot 1.0.beta4
dovecot dovecot 1.0.beta5
dovecot dovecot 1.0.beta6
dovecot dovecot 1.0.beta7
dovecot dovecot 1.0.beta8
dovecot dovecot 1.0.beta9
dovecot dovecot 1.0.rc1
dovecot dovecot 1.0.rc2
dovecot dovecot 1.0.rc3
dovecot dovecot 1.0.rc4
dovecot dovecot 1.0.rc5
dovecot dovecot 1.0.rc6
dovecot dovecot 1.0.rc7
dovecot dovecot 1.0.rc8
dovecot dovecot 1.0.rc9
dovecot dovecot 1.0.rc10
dovecot dovecot 1.0.rc11
dovecot dovecot 1.0.rc12
dovecot dovecot 1.0.rc13
dovecot dovecot 1.0.rc14
dovecot dovecot 1.0.rc15
dovecot dovecot 1.0.rc16
dovecot dovecot 1.0.rc17
dovecot dovecot 1.0.rc18
dovecot dovecot 1.0.rc19
dovecot dovecot 1.0.rc20
dovecot dovecot 1.0.rc21
dovecot dovecot 1.0.rc22
dovecot dovecot 1.0.rc23
dovecot dovecot 1.0.rc24
dovecot dovecot 1.0.rc25
dovecot dovecot 1.0.rc26
dovecot dovecot 1.0.rc27
dovecot dovecot 1.0.rc28
dovecot dovecot 1.0_rc29
dovecot dovecot 1.1
dovecot dovecot 1.1
dovecot dovecot 1.1.0
dovecot dovecot 1.1.1
dovecot dovecot 1.1.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13310053-191A-4931-BA90-2D6F8850A7CF",
              "versionEndIncluding": "1.1.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:0.99.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0616CCF-D278-4B6D-A58B-393BCA128CF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:0.99.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C7BE64-7C1E-4043-A1C5-D0A7377C01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4240BD98-3C31-42CE-AF8F-045DD4BFC084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C05ACA0-ED87-4DDF-94B6-8D25BE1790F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8C0C4A-F9DB-4BB7-BFC5-BEC22C3FE40B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7E00B56-A1E5-4261-8349-37654AA9FB64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E66427AA-A9D4-413F-8354-EA61407307C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D74BE6C7-114D-4885-8472-FFE71C817B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A349510-4D00-4978-93D9-3F9F5E0CD8DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B65B9EFD-1531-463C-992E-F0F16AABF9C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BA7146-5793-44F4-9569-9D868FE6E325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5078363-6B42-491B-A219-F8D8A86132BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DDF093-B5C7-4AE5-B3D6-466C543AB2BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9FBEF6C-4A09-4661-BED0-8B5BC8BAF1AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D680474-C329-4DD0-B4EA-2406E27EC474",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta3:*:*:*:*:*:*:*",
              "matchCriteriaId": "165A0D0B-C6B0-431F-BF36-223A27CD6A42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta4:*:*:*:*:*:*:*",
              "matchCriteriaId": "92FB54D3-F856-4027-8AAF-6B05AE17D520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta5:*:*:*:*:*:*:*",
              "matchCriteriaId": "34759794-747B-4770-8DB5-4E07AA8A15AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D5AF2A0-3289-47FA-B8DB-D5E28504F012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta7:*:*:*:*:*:*:*",
              "matchCriteriaId": "99268D48-CF82-450B-A033-D87AF4109531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2E09737-8107-45C0-BFF1-FB4CF81564CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta9:*:*:*:*:*:*:*",
              "matchCriteriaId": "280BE28D-B8A8-4E76-BC96-DB756C00B994",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "91E74D81-DF10-423A-8549-3BB5ED02B5A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07D6853E-7E81-443D-8806-C8469217F55C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1BE4B6A-47A2-457B-B6B8-8FE5C2026A11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7382F655-9B27-443D-9397-346FBEADEFDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F180045-A0DA-40A3-AD3E-F3402FB6456A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1A2FFE7-D008-47B4-80E7-AEC176918E06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C840337-7B31-476B-BBCD-65F4899925E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc8:*:*:*:*:*:*:*",
              "matchCriteriaId": "545EF2F5-9BAE-4612-9958-70A5413818A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E80096F8-46D9-42E3-8CDB-99ADA2CBD970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E504866-3429-4A4C-8278-5C2753D356C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc11:*:*:*:*:*:*:*",
              "matchCriteriaId": "30857130-636F-4719-9F1E-8F6369F40DAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc12:*:*:*:*:*:*:*",
              "matchCriteriaId": "9843D7CE-4723-4200-AFD4-5B31545A287E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc13:*:*:*:*:*:*:*",
              "matchCriteriaId": "54AF1D92-D89B-4DE4-9D47-72466873A4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc14:*:*:*:*:*:*:*",
              "matchCriteriaId": "64A8FCA5-1666-48F7-9689-37D9315813F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc15:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D517F3-F0A8-4362-89B9-0ED63515283F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc16:*:*:*:*:*:*:*",
              "matchCriteriaId": "23883A94-559B-4655-82D4-F09868235771",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc17:*:*:*:*:*:*:*",
              "matchCriteriaId": "520B52BF-FD23-429D-BAA4-E08DB84C82F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B7948AB-2061-4ADB-A01C-3CE8B47CCD19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C24F6BFB-AA8C-441A-9026-809183D0350E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C22A513A-A94A-4BC4-B5B7-3CCA166C9874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc21:*:*:*:*:*:*:*",
              "matchCriteriaId": "65038654-6B35-4502-BD74-F9F0954C5EF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc22:*:*:*:*:*:*:*",
              "matchCriteriaId": "4307AA80-C0AC-4193-8353-D746DBF52FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc23:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E95BAF5-FC78-4286-B6BD-464E9F08CF9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc24:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C6AA8FD-3692-4069-8980-9544044B8CE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc25:*:*:*:*:*:*:*",
              "matchCriteriaId": "F22AADE9-D37D-439B-B934-8DA01A29BB87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc26:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ECCD893-A5EE-4696-80AA-FD9092548BDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc27:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B960D71-04E5-45F7-8DC2-45C341673FB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc28:*:*:*:*:*:*:*",
              "matchCriteriaId": "658E275E-8C2C-46EE-850A-14ADBD097E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.0_rc29:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AAE9E7C-49CC-48C3-B47C-CDC5802356A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BE860F-A3C2-43E0-BC75-503C437DAADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9E6F249C-2793-46B5-A9E2-5EB3A62FF8E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4E57B06-8650-4374-B643-6FCBE3ABDAF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0384E42-1506-4C08-AA5A-18B2A711C7F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dovecot:dovecot:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DC1CE5-50B9-426E-B98A-224DC499AB15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the \"k\" right to create unauthorized \"parent/child/child\" mailboxes."
    },
    {
      "lang": "es",
      "value": "El plugin ACL en Dovecot anterior a 1.1.4 permite a atacantes remotos evitar las restricciones de acceso previstas utilizando la \"k\" derecha para crear buzones de correo \"parent/child/child\" no autorizados."
    }
  ],
  "id": "CVE-2008-4578",
  "lastModified": "2024-11-21T00:52:01.117",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-10-15T20:08:02.700",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=240409"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32164"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/33149"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-200812-16.xml"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.dovecot.org/list/dovecot-news/2008-October/000085.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:232"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/498498/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/31587"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/2745"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45669"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=240409"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33149"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200812-16.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.dovecot.org/list/dovecot-news/2008-October/000085.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:232"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/498498/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/31587"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2745"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45669"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 5.",
      "lastModified": "2008-10-24T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.