CVE-2022-21649 (GCVE-0-2022-21649)
Vulnerability from cvelistv5 – Published: 2022-01-04 20:40 – Updated: 2025-04-22 18:34
VLAI?
Title
Stored XSS via attribute in convos
Summary
Convos is an open source multi-user chat that runs in a web browser. Characters starting with "https://" in the chat window create an <a> tag. Stored XSS vulnerability using onfocus and autofocus occurs because escaping exists for "<" or ">" but escaping for double quotes does not exist. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible.
Severity ?
7.6 (High)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| convos-chat | convos |
Affected:
>= 6.49, < 6.52
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T02:46:39.529Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://blog.pocas.kr/2021/12/30/2021-12-30-s-xss-convos-chat/#Second-vulnerability"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/convos-chat/convos/commit/86b2193de375005ba71d9dd53843562c6ac1847c"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/convos-chat/convos/security/advisories/GHSA-xmpj-xwm3-vww7"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-21649",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-22T15:52:23.471657Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-22T18:34:30.665Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "convos",
"vendor": "convos-chat",
"versions": [
{
"status": "affected",
"version": "\u003e= 6.49, \u003c 6.52"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Convos is an open source multi-user chat that runs in a web browser. Characters starting with \"https://\" in the chat window create an \u003ca\u003e tag. Stored XSS vulnerability using onfocus and autofocus occurs because escaping exists for \"\u003c\" or \"\u003e\" but escaping for double quotes does not exist. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-01-04T20:40:20.000Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://blog.pocas.kr/2021/12/30/2021-12-30-s-xss-convos-chat/#Second-vulnerability"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/convos-chat/convos/commit/86b2193de375005ba71d9dd53843562c6ac1847c"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/convos-chat/convos/security/advisories/GHSA-xmpj-xwm3-vww7"
}
],
"source": {
"advisory": "GHSA-xmpj-xwm3-vww7",
"discovery": "UNKNOWN"
},
"title": "Stored XSS via attribute in convos",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-21649",
"STATE": "PUBLIC",
"TITLE": "Stored XSS via attribute in convos"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "convos",
"version": {
"version_data": [
{
"version_value": "\u003e= 6.49, \u003c 6.52"
}
]
}
}
]
},
"vendor_name": "convos-chat"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Convos is an open source multi-user chat that runs in a web browser. Characters starting with \"https://\" in the chat window create an \u003ca\u003e tag. Stored XSS vulnerability using onfocus and autofocus occurs because escaping exists for \"\u003c\" or \"\u003e\" but escaping for double quotes does not exist. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://blog.pocas.kr/2021/12/30/2021-12-30-s-xss-convos-chat/#Second-vulnerability",
"refsource": "MISC",
"url": "https://blog.pocas.kr/2021/12/30/2021-12-30-s-xss-convos-chat/#Second-vulnerability"
},
{
"name": "https://github.com/convos-chat/convos/commit/86b2193de375005ba71d9dd53843562c6ac1847c",
"refsource": "MISC",
"url": "https://github.com/convos-chat/convos/commit/86b2193de375005ba71d9dd53843562c6ac1847c"
},
{
"name": "https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/",
"refsource": "MISC",
"url": "https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/"
},
{
"name": "https://github.com/convos-chat/convos/security/advisories/GHSA-xmpj-xwm3-vww7",
"refsource": "CONFIRM",
"url": "https://github.com/convos-chat/convos/security/advisories/GHSA-xmpj-xwm3-vww7"
}
]
},
"source": {
"advisory": "GHSA-xmpj-xwm3-vww7",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2022-21649",
"datePublished": "2022-01-04T20:40:20.000Z",
"dateReserved": "2021-11-16T00:00:00.000Z",
"dateUpdated": "2025-04-22T18:34:30.665Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-21649\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-01-04T21:15:07.883\",\"lastModified\":\"2024-11-21T06:45:09.153\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Convos is an open source multi-user chat that runs in a web browser. Characters starting with \\\"https://\\\" in the chat window create an \u003ca\u003e tag. Stored XSS vulnerability using onfocus and autofocus occurs because escaping exists for \\\"\u003c\\\" or \\\"\u003e\\\" but escaping for double quotes does not exist. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible.\"},{\"lang\":\"es\",\"value\":\"Convos es un chat multiusuario de c\u00f3digo abierto que es ejecutado en un navegador web. Los caracteres que empiezan por \\\"https://\\\" en la ventana de chat crean una etiqueta (a). Una vulnerabilidad de tipo XSS almacenada que usa onfocus y autofocus se produce porque el escape se presenta para \\\"(\\\" o \\\")\\\" pero el escape para las comillas dobles no se presenta. Mediante esta vulnerabilidad, un atacante es capaz de ejecutar scripts maliciosos. Se aconseja a usuarios que actualicen lo antes posible\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N\",\"baseScore\":7.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":4.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:convos:convos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.52\",\"matchCriteriaId\":\"DA5BCD6B-4CE6-430F-BD22-D399291AEFDB\"}]}]}],\"references\":[{\"url\":\"https://blog.pocas.kr/2021/12/30/2021-12-30-s-xss-convos-chat/#Second-vulnerability\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/convos-chat/convos/commit/86b2193de375005ba71d9dd53843562c6ac1847c\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/convos-chat/convos/security/advisories/GHSA-xmpj-xwm3-vww7\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://blog.pocas.kr/2021/12/30/2021-12-30-s-xss-convos-chat/#Second-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/convos-chat/convos/commit/86b2193de375005ba71d9dd53843562c6ac1847c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/convos-chat/convos/security/advisories/GHSA-xmpj-xwm3-vww7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"affected\": [{\"product\": \"convos\", \"vendor\": \"convos-chat\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 6.49, \u003c 6.52\"}]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Convos is an open source multi-user chat that runs in a web browser. Characters starting with \\\"https://\\\" in the chat window create an \u003ca\u003e tag. Stored XSS vulnerability using onfocus and autofocus occurs because escaping exists for \\\"\u003c\\\" or \\\"\u003e\\\" but escaping for double quotes does not exist. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible.\"}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"NONE\", \"baseScore\": 7.6, \"baseSeverity\": \"HIGH\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"scope\": \"CHANGED\", \"userInteraction\": \"REQUIRED\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N\", \"version\": \"3.1\"}}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-79\", \"description\": \"CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"dateUpdated\": \"2022-01-04T20:40:20.000Z\", \"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\"}, \"references\": [{\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://blog.pocas.kr/2021/12/30/2021-12-30-s-xss-convos-chat/#Second-vulnerability\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/convos-chat/convos/commit/86b2193de375005ba71d9dd53843562c6ac1847c\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/convos-chat/convos/security/advisories/GHSA-xmpj-xwm3-vww7\"}], \"source\": {\"advisory\": \"GHSA-xmpj-xwm3-vww7\", \"discovery\": \"UNKNOWN\"}, \"title\": \"Stored XSS via attribute in convos\", \"x_legacyV4Record\": {\"CVE_data_meta\": {\"ASSIGNER\": \"security-advisories@github.com\", \"ID\": \"CVE-2022-21649\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Stored XSS via attribute in convos\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"product_name\": \"convos\", \"version\": {\"version_data\": [{\"version_value\": \"\u003e= 6.49, \u003c 6.52\"}]}}]}, \"vendor_name\": \"convos-chat\"}]}}, \"data_format\": \"MITRE\", \"data_type\": \"CVE\", \"data_version\": \"4.0\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Convos is an open source multi-user chat that runs in a web browser. Characters starting with \\\"https://\\\" in the chat window create an \u003ca\u003e tag. Stored XSS vulnerability using onfocus and autofocus occurs because escaping exists for \\\"\u003c\\\" or \\\"\u003e\\\" but escaping for double quotes does not exist. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible.\"}]}, \"impact\": {\"cvss\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"NONE\", \"baseScore\": 7.6, \"baseSeverity\": \"HIGH\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"scope\": \"CHANGED\", \"userInteraction\": \"REQUIRED\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N\", \"version\": \"3.1\"}}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}]}, \"references\": {\"reference_data\": [{\"name\": \"https://blog.pocas.kr/2021/12/30/2021-12-30-s-xss-convos-chat/#Second-vulnerability\", \"refsource\": \"MISC\", \"url\": \"https://blog.pocas.kr/2021/12/30/2021-12-30-s-xss-convos-chat/#Second-vulnerability\"}, {\"name\": \"https://github.com/convos-chat/convos/commit/86b2193de375005ba71d9dd53843562c6ac1847c\", \"refsource\": \"MISC\", \"url\": \"https://github.com/convos-chat/convos/commit/86b2193de375005ba71d9dd53843562c6ac1847c\"}, {\"name\": \"https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/\", \"refsource\": \"MISC\", \"url\": \"https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/\"}, {\"name\": \"https://github.com/convos-chat/convos/security/advisories/GHSA-xmpj-xwm3-vww7\", \"refsource\": \"CONFIRM\", \"url\": \"https://github.com/convos-chat/convos/security/advisories/GHSA-xmpj-xwm3-vww7\"}]}, \"source\": {\"advisory\": \"GHSA-xmpj-xwm3-vww7\", \"discovery\": \"UNKNOWN\"}}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T02:46:39.529Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://blog.pocas.kr/2021/12/30/2021-12-30-s-xss-convos-chat/#Second-vulnerability\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://github.com/convos-chat/convos/commit/86b2193de375005ba71d9dd53843562c6ac1847c\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://github.com/convos-chat/convos/security/advisories/GHSA-xmpj-xwm3-vww7\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-21649\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-22T15:52:23.471657Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-22T15:52:24.829Z\"}}]}",
"cveMetadata": "{\"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"assignerShortName\": \"GitHub_M\", \"cveId\": \"CVE-2022-21649\", \"datePublished\": \"2022-01-04T20:40:20.000Z\", \"dateReserved\": \"2021-11-16T00:00:00.000Z\", \"dateUpdated\": \"2025-04-22T18:34:30.665Z\", \"state\": \"PUBLISHED\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…