Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-0174 (GCVE-0-2014-0174)
Vulnerability from cvelistv5 – Published: 2014-07-11 14:00 – Updated: 2024-08-06 09:05- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:05:39.195Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2014:0858",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0858.html"
},
{
"name": "RHSA-2014:0859",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0859.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-07-09T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-07-11T13:57:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2014:0858",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0858.html"
},
{
"name": "RHSA-2014:0859",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0859.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2014-0174",
"datePublished": "2014-07-11T14:00:00.000Z",
"dateReserved": "2013-12-03T00:00:00.000Z",
"dateUpdated": "2024-08-06T09:05:39.195Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2014-0174",
"date": "2026-05-02",
"epss": "0.00236",
"percentile": "0.46523"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2014-0174\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-07-11T14:55:03.617\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.\"},{\"lang\":\"es\",\"value\":\"Cumin (tambi\u00e9n conocido como MRG Management Console), utilizado en Red Hat Enterprise MRG 2.5, no incluye el indicador HTTPOnly en una cabecera Set-Cookie para la cookie de la sesi\u00f3n, lo que facilita a atacantes remotos obtener informaci\u00f3n potencialmente sensible a trav\u00e9s del acceso de secuencias de comandos a esta cookie.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_mrg:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8082D9CA-E5CC-4B92-9F45-E257F246069F\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0858.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0859.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0858.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0859.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
RHSA-2014:0859
Vulnerability from csaf_redhat - Published: 2014-07-09 08:49 - Updated: 2025-11-21 17:49It was found that if Cumin were asked to display a link name containing non-ASCII characters, the request would terminate with an error. If data containing non-ASCII characters were added to the database (such as via Cumin or Wallaby), requests to load said data would terminate and the requested page would not be displayed until an administrator cleans the database.
It was found that Cumin did not set the HttpOnly flag on session cookies. This could allow a malicious script to access the session cookie.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated cumin package that fixes two security issues is now available\nfor Red Hat Enterprise MRG 2.5 for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having Moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation\nIT infrastructure for enterprise computing. MRG offers increased\nperformance, reliability, interoperability, and faster computing for\nenterprise customers.\n\nIt was found that if Cumin were asked to display a link name containing\nnon-ASCII characters, the request would terminate with an error. If data\ncontaining non-ASCII characters were added to the database (such as via\nCumin or Wallaby), requests to load said data would terminate and the\nrequested page would not be displayed until an administrator cleans the\ndatabase. (CVE-2012-2682)\n\nIt was found that Cumin did not set the HttpOnly flag on session cookies.\nThis could allow a malicious script to access the session cookie.\n(CVE-2014-0174)\n\nThese issues were discovered by Stanislav Graf of Red Hat.\n\nAll users of cumin with Red Hat Enterprise MRG 2.5 for Red Hat Enterprise\nLinux 5 are advised to upgrade to this updated package, which corrects\nthese issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2014:0859",
"url": "https://access.redhat.com/errata/RHSA-2014:0859"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "830254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=830254"
},
{
"category": "external",
"summary": "1086000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1086000"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0859.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Enterprise MRG 2.5 Messaging and Grid security update",
"tracking": {
"current_release_date": "2025-11-21T17:49:05+00:00",
"generator": {
"date": "2025-11-21T17:49:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2014:0859",
"initial_release_date": "2014-07-09T08:49:42+00:00",
"revision_history": [
{
"date": "2014-07-09T08:49:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2014-07-09T08:49:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:49:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "MRG Grid for RHEL 5 Server v.2",
"product": {
"name": "MRG Grid for RHEL 5 Server v.2",
"product_id": "5Server-MRG-Grid-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2::el5"
}
}
},
{
"category": "product_name",
"name": "MRG Management for RHEL 5 Server v.2",
"product": {
"name": "MRG Management for RHEL 5 Server v.2",
"product_id": "5Server-MRG-Management-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-5"
},
{
"branches": [
{
"category": "product_version",
"name": "cumin-0:0.1.5796-4.el5_9.src",
"product": {
"name": "cumin-0:0.1.5796-4.el5_9.src",
"product_id": "cumin-0:0.1.5796-4.el5_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cumin@0.1.5796-4.el5_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "cumin-0:0.1.5796-4.el5_9.noarch",
"product": {
"name": "cumin-0:0.1.5796-4.el5_9.noarch",
"product_id": "cumin-0:0.1.5796-4.el5_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cumin@0.1.5796-4.el5_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cumin-0:0.1.5796-4.el5_9.noarch as a component of MRG Grid for RHEL 5 Server v.2",
"product_id": "5Server-MRG-Grid-2:cumin-0:0.1.5796-4.el5_9.noarch"
},
"product_reference": "cumin-0:0.1.5796-4.el5_9.noarch",
"relates_to_product_reference": "5Server-MRG-Grid-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cumin-0:0.1.5796-4.el5_9.src as a component of MRG Grid for RHEL 5 Server v.2",
"product_id": "5Server-MRG-Grid-2:cumin-0:0.1.5796-4.el5_9.src"
},
"product_reference": "cumin-0:0.1.5796-4.el5_9.src",
"relates_to_product_reference": "5Server-MRG-Grid-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cumin-0:0.1.5796-4.el5_9.noarch as a component of MRG Management for RHEL 5 Server v.2",
"product_id": "5Server-MRG-Management-2:cumin-0:0.1.5796-4.el5_9.noarch"
},
"product_reference": "cumin-0:0.1.5796-4.el5_9.noarch",
"relates_to_product_reference": "5Server-MRG-Management-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cumin-0:0.1.5796-4.el5_9.src as a component of MRG Management for RHEL 5 Server v.2",
"product_id": "5Server-MRG-Management-2:cumin-0:0.1.5796-4.el5_9.src"
},
"product_reference": "cumin-0:0.1.5796-4.el5_9.src",
"relates_to_product_reference": "5Server-MRG-Management-2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Stanislav Graf"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2012-2682",
"discovery_date": "2012-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "830254"
}
],
"notes": [
{
"category": "description",
"text": "It was found that if Cumin were asked to display a link name containing non-ASCII characters, the request would terminate with an error. If data containing non-ASCII characters were added to the database (such as via Cumin or Wallaby), requests to load said data would terminate and the requested page would not be displayed until an administrator cleans the database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cumin: DoS via displayed link names containing non-ASCII characters",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Grid-2:cumin-0:0.1.5796-4.el5_9.noarch",
"5Server-MRG-Grid-2:cumin-0:0.1.5796-4.el5_9.src",
"5Server-MRG-Management-2:cumin-0:0.1.5796-4.el5_9.noarch",
"5Server-MRG-Management-2:cumin-0:0.1.5796-4.el5_9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-2682"
},
{
"category": "external",
"summary": "RHBZ#830254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=830254"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-2682",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2682"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2682",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2682"
}
],
"release_date": "2014-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-07-09T08:49:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"5Server-MRG-Grid-2:cumin-0:0.1.5796-4.el5_9.noarch",
"5Server-MRG-Grid-2:cumin-0:0.1.5796-4.el5_9.src",
"5Server-MRG-Management-2:cumin-0:0.1.5796-4.el5_9.noarch",
"5Server-MRG-Management-2:cumin-0:0.1.5796-4.el5_9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0859"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-MRG-Grid-2:cumin-0:0.1.5796-4.el5_9.noarch",
"5Server-MRG-Grid-2:cumin-0:0.1.5796-4.el5_9.src",
"5Server-MRG-Management-2:cumin-0:0.1.5796-4.el5_9.noarch",
"5Server-MRG-Management-2:cumin-0:0.1.5796-4.el5_9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cumin: DoS via displayed link names containing non-ASCII characters"
},
{
"acknowledgments": [
{
"names": [
"Stanislav Graf"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2014-0174",
"discovery_date": "2014-03-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1086000"
}
],
"notes": [
{
"category": "description",
"text": "It was found that Cumin did not set the HttpOnly flag on session cookies. This could allow a malicious script to access the session cookie.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cumin: session cookies lack httponly setting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Grid-2:cumin-0:0.1.5796-4.el5_9.noarch",
"5Server-MRG-Grid-2:cumin-0:0.1.5796-4.el5_9.src",
"5Server-MRG-Management-2:cumin-0:0.1.5796-4.el5_9.noarch",
"5Server-MRG-Management-2:cumin-0:0.1.5796-4.el5_9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0174"
},
{
"category": "external",
"summary": "RHBZ#1086000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1086000"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0174"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0174",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0174"
}
],
"release_date": "2014-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-07-09T08:49:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"5Server-MRG-Grid-2:cumin-0:0.1.5796-4.el5_9.noarch",
"5Server-MRG-Grid-2:cumin-0:0.1.5796-4.el5_9.src",
"5Server-MRG-Management-2:cumin-0:0.1.5796-4.el5_9.noarch",
"5Server-MRG-Management-2:cumin-0:0.1.5796-4.el5_9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0859"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-MRG-Grid-2:cumin-0:0.1.5796-4.el5_9.noarch",
"5Server-MRG-Grid-2:cumin-0:0.1.5796-4.el5_9.src",
"5Server-MRG-Management-2:cumin-0:0.1.5796-4.el5_9.noarch",
"5Server-MRG-Management-2:cumin-0:0.1.5796-4.el5_9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cumin: session cookies lack httponly setting"
}
]
}
RHSA-2014:0858
Vulnerability from csaf_redhat - Published: 2014-07-09 08:49 - Updated: 2025-11-21 17:49It was found that if Cumin were asked to display a link name containing non-ASCII characters, the request would terminate with an error. If data containing non-ASCII characters were added to the database (such as via Cumin or Wallaby), requests to load said data would terminate and the requested page would not be displayed until an administrator cleans the database.
It was found that Cumin did not set the HttpOnly flag on session cookies. This could allow a malicious script to access the session cookie.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated cumin package that fixes two security issues is now available\nfor Red Hat Enterprise MRG 2.5 for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having Moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation\nIT infrastructure for enterprise computing. MRG offers increased\nperformance, reliability, interoperability, and faster computing for\nenterprise customers.\n\nIt was found that if Cumin were asked to display a link name containing\nnon-ASCII characters, the request would terminate with an error. If data\ncontaining non-ASCII characters were added to the database (such as via\nCumin or Wallaby), requests to load said data would terminate and the\nrequested page would not be displayed until an administrator cleans the\ndatabase. (CVE-2012-2682)\n\nIt was found that Cumin did not set the HttpOnly flag on session cookies.\nThis could allow a malicious script to access the session cookie.\n(CVE-2014-0174)\n\nThese issues were discovered by Stanislav Graf of Red Hat.\n\nAll users of cumin with Red Hat Enterprise MRG 2.5 for Red Hat Enterprise\nLinux 6 are advised to upgrade to this updated package, which corrects\nthese issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2014:0858",
"url": "https://access.redhat.com/errata/RHSA-2014:0858"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "830254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=830254"
},
{
"category": "external",
"summary": "1086000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1086000"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0858.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Enterprise MRG 2.5 Messaging and Grid security update",
"tracking": {
"current_release_date": "2025-11-21T17:49:04+00:00",
"generator": {
"date": "2025-11-21T17:49:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2014:0858",
"initial_release_date": "2014-07-09T08:49:48+00:00",
"revision_history": [
{
"date": "2014-07-09T08:49:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2014-07-09T08:49:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:49:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Grid for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Grid for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Grid-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat MRG Management for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Management for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Management-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "cumin-0:0.1.5797-3.el6.src",
"product": {
"name": "cumin-0:0.1.5797-3.el6.src",
"product_id": "cumin-0:0.1.5797-3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cumin@0.1.5797-3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "cumin-0:0.1.5797-3.el6.noarch",
"product": {
"name": "cumin-0:0.1.5797-3.el6.noarch",
"product_id": "cumin-0:0.1.5797-3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cumin@0.1.5797-3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cumin-0:0.1.5797-3.el6.noarch as a component of Red Hat MRG Grid for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Grid-2:cumin-0:0.1.5797-3.el6.noarch"
},
"product_reference": "cumin-0:0.1.5797-3.el6.noarch",
"relates_to_product_reference": "6Server-MRG-Grid-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cumin-0:0.1.5797-3.el6.src as a component of Red Hat MRG Grid for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Grid-2:cumin-0:0.1.5797-3.el6.src"
},
"product_reference": "cumin-0:0.1.5797-3.el6.src",
"relates_to_product_reference": "6Server-MRG-Grid-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cumin-0:0.1.5797-3.el6.noarch as a component of Red Hat MRG Management for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Management-2:cumin-0:0.1.5797-3.el6.noarch"
},
"product_reference": "cumin-0:0.1.5797-3.el6.noarch",
"relates_to_product_reference": "6Server-MRG-Management-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cumin-0:0.1.5797-3.el6.src as a component of Red Hat MRG Management for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Management-2:cumin-0:0.1.5797-3.el6.src"
},
"product_reference": "cumin-0:0.1.5797-3.el6.src",
"relates_to_product_reference": "6Server-MRG-Management-2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Stanislav Graf"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2012-2682",
"discovery_date": "2012-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "830254"
}
],
"notes": [
{
"category": "description",
"text": "It was found that if Cumin were asked to display a link name containing non-ASCII characters, the request would terminate with an error. If data containing non-ASCII characters were added to the database (such as via Cumin or Wallaby), requests to load said data would terminate and the requested page would not be displayed until an administrator cleans the database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cumin: DoS via displayed link names containing non-ASCII characters",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Grid-2:cumin-0:0.1.5797-3.el6.noarch",
"6Server-MRG-Grid-2:cumin-0:0.1.5797-3.el6.src",
"6Server-MRG-Management-2:cumin-0:0.1.5797-3.el6.noarch",
"6Server-MRG-Management-2:cumin-0:0.1.5797-3.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-2682"
},
{
"category": "external",
"summary": "RHBZ#830254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=830254"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-2682",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2682"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2682",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2682"
}
],
"release_date": "2014-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-07-09T08:49:48+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-MRG-Grid-2:cumin-0:0.1.5797-3.el6.noarch",
"6Server-MRG-Grid-2:cumin-0:0.1.5797-3.el6.src",
"6Server-MRG-Management-2:cumin-0:0.1.5797-3.el6.noarch",
"6Server-MRG-Management-2:cumin-0:0.1.5797-3.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0858"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-MRG-Grid-2:cumin-0:0.1.5797-3.el6.noarch",
"6Server-MRG-Grid-2:cumin-0:0.1.5797-3.el6.src",
"6Server-MRG-Management-2:cumin-0:0.1.5797-3.el6.noarch",
"6Server-MRG-Management-2:cumin-0:0.1.5797-3.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cumin: DoS via displayed link names containing non-ASCII characters"
},
{
"acknowledgments": [
{
"names": [
"Stanislav Graf"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2014-0174",
"discovery_date": "2014-03-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1086000"
}
],
"notes": [
{
"category": "description",
"text": "It was found that Cumin did not set the HttpOnly flag on session cookies. This could allow a malicious script to access the session cookie.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cumin: session cookies lack httponly setting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Grid-2:cumin-0:0.1.5797-3.el6.noarch",
"6Server-MRG-Grid-2:cumin-0:0.1.5797-3.el6.src",
"6Server-MRG-Management-2:cumin-0:0.1.5797-3.el6.noarch",
"6Server-MRG-Management-2:cumin-0:0.1.5797-3.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0174"
},
{
"category": "external",
"summary": "RHBZ#1086000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1086000"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0174"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0174",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0174"
}
],
"release_date": "2014-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-07-09T08:49:48+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-MRG-Grid-2:cumin-0:0.1.5797-3.el6.noarch",
"6Server-MRG-Grid-2:cumin-0:0.1.5797-3.el6.src",
"6Server-MRG-Management-2:cumin-0:0.1.5797-3.el6.noarch",
"6Server-MRG-Management-2:cumin-0:0.1.5797-3.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0858"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-MRG-Grid-2:cumin-0:0.1.5797-3.el6.noarch",
"6Server-MRG-Grid-2:cumin-0:0.1.5797-3.el6.src",
"6Server-MRG-Management-2:cumin-0:0.1.5797-3.el6.noarch",
"6Server-MRG-Management-2:cumin-0:0.1.5797-3.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cumin: session cookies lack httponly setting"
}
]
}
GHSA-P88M-27C7-422H
Vulnerability from github – Published: 2022-05-13 01:08 – Updated: 2022-05-13 01:08Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
{
"affected": [],
"aliases": [
"CVE-2014-0174"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2014-07-11T14:55:00Z",
"severity": "MODERATE"
},
"details": "Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.",
"id": "GHSA-p88m-27c7-422h",
"modified": "2022-05-13T01:08:49Z",
"published": "2022-05-13T01:08:49Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0174"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0858.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0859.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2014-0174
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2014-0174",
"description": "Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.",
"id": "GSD-2014-0174",
"references": [
"https://access.redhat.com/errata/RHSA-2014:0859",
"https://access.redhat.com/errata/RHSA-2014:0858"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2014-0174"
],
"details": "Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.",
"id": "GSD-2014-0174",
"modified": "2023-12-13T01:22:43.852453Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0174",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://rhn.redhat.com/errata/RHSA-2014-0858.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0858.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2014-0859.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0859.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_mrg:2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0174"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2014:0858",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0858.html"
},
{
"name": "RHSA-2014:0859",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0859.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2021-07-15T19:15Z",
"publishedDate": "2014-07-11T14:55Z"
}
}
}
FKIE_CVE-2014-0174
Vulnerability from fkie_nvd - Published: 2014-07-11 14:55 - Updated: 2025-04-12 10:46| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-0858.html | Vendor Advisory | |
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-0859.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-0858.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-0859.html | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| redhat | enterprise_mrg | 2.5 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_mrg:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8082D9CA-E5CC-4B92-9F45-E257F246069F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie."
},
{
"lang": "es",
"value": "Cumin (tambi\u00e9n conocido como MRG Management Console), utilizado en Red Hat Enterprise MRG 2.5, no incluye el indicador HTTPOnly en una cabecera Set-Cookie para la cookie de la sesi\u00f3n, lo que facilita a atacantes remotos obtener informaci\u00f3n potencialmente sensible a trav\u00e9s del acceso de secuencias de comandos a esta cookie."
}
],
"id": "CVE-2014-0174",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-07-11T14:55:03.617",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0858.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0859.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0858.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0859.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.