fkie_cve-2015-0718
Vulnerability from fkie_nvd
Published
2016-03-03 22:59
Modified
2024-11-21 02:23
Summary
Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579.
Impacted products
Vendor Product Version
cisco unified_computing_system 1.4_1i
cisco unified_computing_system 1.4_1j
cisco unified_computing_system 1.4_1m
cisco unified_computing_system 1.4_3i
cisco unified_computing_system 1.4_3l
cisco unified_computing_system 1.4_3m
cisco unified_computing_system 1.4_3q
cisco unified_computing_system 1.4_3s
cisco unified_computing_system 1.4_3u
cisco unified_computing_system 1.4_3y
cisco unified_computing_system 1.4_4f
cisco unified_computing_system 1.4_4g
cisco unified_computing_system 1.4_4i
cisco unified_computing_system 1.4_4j
cisco unified_computing_system 1.4_4k
cisco unified_computing_system 1.4_4l
cisco unified_computing_system 1.5_base
cisco unified_computing_system 1.6_base
cisco unified_computing_system 2.0_1q
cisco unified_computing_system 2.0_1s
cisco unified_computing_system 2.0_1t
cisco unified_computing_system 2.0_1w
cisco unified_computing_system 2.0_1x
cisco unified_computing_system 2.0_2m
cisco unified_computing_system 2.0_2q
cisco unified_computing_system 2.0_2r
cisco unified_computing_system 2.0_3a
cisco unified_computing_system 2.0_3b
cisco unified_computing_system 2.0_3c
cisco unified_computing_system 2.0_4a
cisco unified_computing_system 2.0_4b
cisco unified_computing_system 2.0_4d
cisco unified_computing_system 2.0_5a
cisco unified_computing_system 2.0_5b
cisco unified_computing_system 2.0_5c
cisco unified_computing_system 2.0_5d
cisco unified_computing_system 2.0_5e
cisco unified_computing_system 2.0_5f
cisco unified_computing_system 2.1_1a
cisco unified_computing_system 2.1_1b
cisco unified_computing_system 2.1_1d
cisco unified_computing_system 2.1_1e
cisco unified_computing_system 2.1_1f
cisco unified_computing_system 2.1_2a
cisco unified_computing_system 2.1_2c
cisco unified_computing_system 2.1_2d
cisco unified_computing_system 2.1_3a
cisco unified_computing_system 2.1_3b
cisco unified_computing_system 2.1_3c
cisco unified_computing_system 2.1_3d
cisco unified_computing_system 2.1_3e
cisco unified_computing_system 2.1_3f
cisco unified_computing_system 2.2_1b
cisco unified_computing_system 2.2_1c
cisco unified_computing_system 2.2_1d
cisco unified_computing_system 2.2_1e
cisco unified_computing_system 2.2_2c
cisco unified_computing_system 2.2_2d
cisco unified_computing_system 2.2_2e
cisco nx-os base
netgear jr6150_firmware *
samsung x14j_firmware t-ms14jakucb-1102.5
sun opensolaris snv_124
zyxel gs1900-10hp_firmware *
zzinc keymouse_firmware 3.08



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_1i:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB6F78F3-0C2E-4F0F-8D2E-31B67DB42472",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_1j:*:*:*:*:*:*:*",
              "matchCriteriaId": "A80A2C90-5B7C-4EC1-80A9-729A0F06031E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_1m:*:*:*:*:*:*:*",
              "matchCriteriaId": "65BC2A14-4A72-4758-BE17-CBF827569D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_3i:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1909BD-03D2-4F27-9072-4EB8261F19AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_3l:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9195CA-1339-4893-B8A4-971F4B925349",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_3m:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7D87DEE-2CEC-463F-835A-1974B4C4F1E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_3q:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1628CE3-1493-4C35-941D-8C3AA1044467",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE970756-5E04-4FAE-8589-AC68AA52EC85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_3u:*:*:*:*:*:*:*",
              "matchCriteriaId": "781FF06A-3F99-4DC7-A79D-C8582E5C5FF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_3y:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D3819FA-1AAE-48C6-9137-DACF35F820BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_4f:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5557821-D83E-4D39-8499-A1503EDA13E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_4g:*:*:*:*:*:*:*",
              "matchCriteriaId": "259FC572-CAC3-4AC7-847E-8DADF58F6244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_4i:*:*:*:*:*:*:*",
              "matchCriteriaId": "E99A5257-B675-43E8-AB96-9E8AE5C38770",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_4j:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD515D92-4684-4C6A-B357-C0C1760332B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_4k:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C9D48E-69BE-437C-AEAA-8087E7BDE01A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_4l:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6FB1056-A8C0-498A-94DB-CF3D6B4B1952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.5_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "9673825E-FA14-4E70-8B5C-A6978E78C2C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:1.6_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "38CBE00C-943C-4370-9E94-18B2A59384FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_1q:*:*:*:*:*:*:*",
              "matchCriteriaId": "45D47062-3D36-44B3-A03F-E716CA28E490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DCAE42A-01E0-4120-93B6-6C65C3CC5840",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_1t:*:*:*:*:*:*:*",
              "matchCriteriaId": "037BF8C3-352F-413F-81B3-F982979F1D76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9ED255-9107-4408-9594-9DAB32DEB793",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_1x:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E6A1EF9-2AD6-4592-B9B2-68B7D31818EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_2m:*:*:*:*:*:*:*",
              "matchCriteriaId": "208A941A-6D38-4A87-BC9C-08533CC5A345",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_2q:*:*:*:*:*:*:*",
              "matchCriteriaId": "70287DD2-D08B-4651-B919-98132083955E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_2r:*:*:*:*:*:*:*",
              "matchCriteriaId": "C509B7EC-3249-4F81-A84F-07A591A7607D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ADB38CA-107C-4B25-A3F4-481BD40E2B13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_3b:*:*:*:*:*:*:*",
              "matchCriteriaId": "1914FC5D-F732-45D1-B743-C001FC097C45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_3c:*:*:*:*:*:*:*",
              "matchCriteriaId": "05A47393-B4EC-4463-A3C8-18DA544180BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FAC5FB0-D5A7-4C94-A3EA-945AE98BA06E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_4b:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C875EC7-6B52-4CA8-9114-94B643C8B6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_4d:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF61A3E-628A-4B44-96B7-7FC287012A05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E85B5F-34DA-4AB8-B024-67356622753F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "44454A17-1A9A-4C9B-8B3D-09B4FEA57EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_5c:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1433216-CD80-4592-88A9-F77609E6A2D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_5d:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C864C5B-71C7-40F9-87E4-38C40B403062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_5e:*:*:*:*:*:*:*",
              "matchCriteriaId": "700023BC-C599-48B8-9270-9F9FEF5226A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_5f:*:*:*:*:*:*:*",
              "matchCriteriaId": "E95DC7AD-6FAB-452B-B28D-897B0A54A8A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C450C35-F3AE-4764-B526-C8AC72ACE23D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "7163742C-2D4A-4B9A-A5F0-9EE7C0EDEECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C4011-EA09-49D3-B691-0BA723B0A12A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "34A654BC-1438-47B6-8003-8B26BCC5609D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_1f:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FCBDCA-F7AF-4AB7-9969-03C4B54708CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B636D4C-EEE2-4DE2-A0BE-D027F2685596",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_2c:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB26588E-4BDE-404B-B260-97409CBA5484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_2d:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E36183-43A7-4F1E-AA0F-6B4F7DC508A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "83BE0150-A046-4471-A8DC-84B452D48E23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_3b:*:*:*:*:*:*:*",
              "matchCriteriaId": "291162BE-4233-4BA5-B8B0-6AF52D2D82F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_3c:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A806750-804B-4B95-A627-6FE9F438502F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_3d:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDAEBA25-BA6E-4E5C-8602-1AFD5211148B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_3e:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D3447A9-A5F4-4B5C-A9EE-512EBD902AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_3f:*:*:*:*:*:*:*",
              "matchCriteriaId": "E222E1CA-7A13-42BC-ADC7-C2435A7111D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.2_1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC205C79-0841-4AB3-8DAE-D01813615DF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.2_1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "97261FA3-E148-430A-B019-1CC2D8C3732F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.2_1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D20009-880B-470E-84DF-20E8A0795E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.2_1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "E15905A8-2BC7-4A5D-8C93-9FC703F0B705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.2_2c:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A3BEF89-20FC-4BB6-B1BC-3795235ED998",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.2_2d:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E8BBA0E-5CD3-4F83-B664-8C235548A233",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_computing_system:2.2_2e:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB74768A-D3C9-4D47-8F3E-850855EBB5D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:base:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFBAD221-BBD3-4BE6-974F-361C8E0FC6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF8ACF6-2BDF-49C2-B92F-2207D83664BF",
              "versionEndExcluding": "2017-01-06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A5867B4-EC19-45D4-87BE-867E1D41ECD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "09B35C0E-6CBA-4B6B-BCD2-F5CC0BF8CF53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E",
              "versionEndExcluding": "2.50\\(aazi.0\\)c0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zzinc:keymouse_firmware:3.08:*:*:*:*:windows:*:*",
              "matchCriteriaId": "83223AC7-22F3-4FCA-B11B-B769086DCF04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579."
    },
    {
      "lang": "es",
      "value": "Cisco NX-OS 4.0 hasta la versi\u00f3n 6.1 en dispositivos Nexus 1000V 3000, 4000, 5000, 6000 y 7000 y plataformas Unified Computing System (UCS) permite a atancantes remotos causar una denegaci\u00f3n de servicio (recarga de pila TCP) mediante el env\u00edo de paquetes TCP manipulados a un dispositivo que tenga una sesi\u00f3n TIME_WAIT TCP, tambi\u00e9n conocido como Bug ID CSCub70579."
    }
  ],
  "id": "CVE-2015-0718",
  "lastModified": "2024-11-21T02:23:35.747",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-03-03T22:59:02.707",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-netstack"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id/1035159"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id/1035160"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-netstack"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035160"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.