Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-9297 (GCVE-0-2014-9297)
Vulnerability from cvelistv5
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2015-10-04T19:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"rejectedReasons": [
{
"lang": "en",
"value": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-9297",
"datePublished": "2015-10-04T20:00:00.000Z",
"dateRejected": "2015-10-04T19:57:01.000Z",
"dateReserved": "2014-12-05T00:00:00.000Z",
"dateUpdated": "2015-10-04T19:57:01.000Z",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}
CERTFR-2015-AVI-162
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits F5. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| F5 | BIG-IQ | F5 BIG-IQ Security versions 4.5.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP WOM versions 10.2.4 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP Link Controller versions 10.2.4 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP PSM versions 10.2.4 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP LTM versions 11.6.0 et antérieures | ||
| F5 | BIG-IQ | F5 BIG-IQ Cloud versions 4.5.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP APM versions 10.2.4 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP WOM versions 11.3.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP WebAccelerator versions 11.3.0 et antérieures | ||
| F5 | N/A | F5 Traffix SDC versions 4.1.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP AAM versions 11.6.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP ASM versions 11.6.0 et antérieures | ||
| F5 | BIG-IQ | F5 BIG-IQ ADC versions 4.5.0 et antérieures | ||
| F5 | N/A | F5 Entreprise Manager versions 2.3.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP ASM versions 10.2.4 et antérieures | ||
| F5 | N/A | F5 ARX versions 6.4.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP Link Controller versions 11.6.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP WebAccelerator versions 10.2.4 et antérieures | ||
| F5 | N/A | F5 Traffix SDC versions 3.5.1 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP Analytics versions 11.6.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP PEM versions 11.6.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP GTM versions 11.6.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP AFM versions 11.6.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP Edge Gateway versions 10.2.4 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP APM versions 11.6.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP GTM versions 10.2.4 et antérieures | ||
| F5 | BIG-IQ | F5 BIG-IQ Device versions 4.5.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP LTM versions 10.2.4 et antérieures | ||
| F5 | N/A | F5 Entreprise Manager versions 3.1.1 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP Edge Gateway versions 11.3.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP PSM versions 11.4.1 et antérieures |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "F5 BIG-IQ Security versions 4.5.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IQ",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP WOM versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP Link Controller versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP PSM versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP LTM versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IQ Cloud versions 4.5.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IQ",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP APM versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP WOM versions 11.3.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP WebAccelerator versions 11.3.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 Traffix SDC versions 4.1.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP AAM versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP ASM versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IQ ADC versions 4.5.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IQ",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 Entreprise Manager versions 2.3.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP ASM versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 ARX versions 6.4.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP Link Controller versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP WebAccelerator versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 Traffix SDC versions 3.5.1 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP Analytics versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP PEM versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP GTM versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP AFM versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP Edge Gateway versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP APM versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP GTM versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IQ Device versions 4.5.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IQ",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP LTM versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 Entreprise Manager versions 3.1.1 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP Edge Gateway versions 11.3.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP PSM versions 11.4.1 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0227"
},
{
"name": "CVE-2014-9297",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9297"
}
],
"initial_release_date": "2015-04-15T00:00:00",
"last_revision_date": "2015-04-15T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-162",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-04-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eF5\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits F5",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 sol16392 du 09 avril 2015",
"url": "https://support.f5.com/kb/en-us/solutions/public/16000/300/sol16392.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 sol16344 du 09 avril 2015",
"url": "https://support.f5.com/kb/en-us/solutions/public/16000/300/sol16344.html"
}
]
}
CERTFR-2016-AVI-148
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.1X44-D50, 12.1X46-D35, 12.1X47-D20, 12.3R9, 12.3X48-D15, 13.2R8, 13.3R6, 14.1R5, 14.1X50-D90, 14.1X55-D16 et 14.2R3 | ||
| Juniper Networks | Junos Space | Juniper Junos Space sans le dernier correctif de sécurité |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.1X44-D50, 12.1X46-D35, 12.1X47-D20, 12.3R9, 12.3X48-D15, 13.2R8, 13.3R6, 14.1R5, 14.1X50-D90, 14.1X55-D16 et 14.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos Space sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-9297",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9297"
},
{
"name": "CVE-2014-9298",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9298"
},
{
"name": "CVE-2014-9294",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9294"
},
{
"name": "CVE-2014-9296",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9296"
},
{
"name": "CVE-2014-9293",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9293"
},
{
"name": "CVE-2014-9295",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9295"
}
],
"initial_release_date": "2016-04-29T00:00:00",
"last_revision_date": "2016-04-29T00:00:00",
"links": [],
"reference": "CERTFR-2016-AVI-148",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-04-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Juniper\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10663 du 27 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10663\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2015-AVI-169
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Oracle Solaris. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Solaris versions 11.2 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris versions 10 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-0208",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0208"
},
{
"name": "CVE-2015-2188",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2188"
},
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2015-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2014-9297",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9297"
},
{
"name": "CVE-2014-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0339"
},
{
"name": "CVE-2015-0255",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0255"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
},
{
"name": "CVE-2015-2190",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2190"
},
{
"name": "CVE-2014-3884",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3884"
},
{
"name": "CVE-2014-9623",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9623"
},
{
"name": "CVE-2015-0290",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0290"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0207"
},
{
"name": "CVE-2015-0285",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0285"
},
{
"name": "CVE-2014-3924",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3924"
},
{
"name": "CVE-2015-0204",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0204"
},
{
"name": "CVE-2015-0293",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2015-1787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1787"
},
{
"name": "CVE-2014-3886",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3886"
},
{
"name": "CVE-2015-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
},
{
"name": "CVE-2015-2189",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2189"
},
{
"name": "CVE-2015-0291",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0291"
},
{
"name": "CVE-2015-0289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0289"
},
{
"name": "CVE-2014-5353",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-5353"
}
],
"initial_release_date": "2015-04-15T00:00:00",
"last_revision_date": "2015-04-15T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-169",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-04-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 14 avril 2015",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.