VAR-201408-0277
Vulnerability from variot - Updated: 2025-04-13 23:21Cobham Sailor 900 and 6000 satellite terminals with firmware 1.08 MFHF and 2.11 VHF have hardcoded credentials for the administrator account, which allows attackers to obtain administrative control by leveraging physical access or terminal access. Cobham Sailor 900 and 6000 series satellite terminals contain hardcoded credentials. CWE-798: Use of Hard-coded Credentials https://cwe.mitre.org/data/definitions/798.htmlA remote attacker could control the device. An attacker could exploit the vulnerability to bypass the authentication mechanism and gain access to the affected device. Cobham Sailor firmware version 1.08 MFHF / 2.11 VHF is vulnerable; other versions are also affected
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201408-0277",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "sailor 900",
"scope": "eq",
"trust": 1.6,
"vendor": "cobham",
"version": "2.11_vhf"
},
{
"model": "sailor 900",
"scope": "eq",
"trust": 1.6,
"vendor": "cobham",
"version": "1.08_mfhf"
},
{
"model": "sailor 6000 series",
"scope": "eq",
"trust": 1.6,
"vendor": "cobham",
"version": "1.08_mfhf"
},
{
"model": "sailor 6000 series",
"scope": "eq",
"trust": 1.6,
"vendor": "cobham",
"version": "2.11_vhf"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "cobham plc",
"version": null
},
{
"model": "sailor 6000 series",
"scope": "eq",
"trust": 0.8,
"vendor": "cobham plc",
"version": "1.08 mfhf"
},
{
"model": "sailor 6000 series",
"scope": "eq",
"trust": 0.8,
"vendor": "cobham plc",
"version": "2.11 vhf"
},
{
"model": "sailor 6006 message terminal",
"scope": null,
"trust": 0.8,
"vendor": "cobham plc",
"version": null
},
{
"model": "sailor 6110 mini-c gmdss",
"scope": null,
"trust": 0.8,
"vendor": "cobham plc",
"version": null
},
{
"model": "sailor 6222 vhf",
"scope": null,
"trust": 0.8,
"vendor": "cobham plc",
"version": null
},
{
"model": "sailor 6300 mf/hf",
"scope": null,
"trust": 0.8,
"vendor": "cobham plc",
"version": null
},
{
"model": "sailor 900 vsat",
"scope": null,
"trust": 0.8,
"vendor": "cobham plc",
"version": null
},
{
"model": "sailor 900",
"scope": "eq",
"trust": 0.8,
"vendor": "cobham plc",
"version": "1.08 mfhf"
},
{
"model": "sailor 900",
"scope": "eq",
"trust": 0.8,
"vendor": "cobham plc",
"version": "2.11 vhf"
},
{
"model": "sailor satellite terminals mfhf vhf",
"scope": "eq",
"trust": 0.6,
"vendor": "cobham",
"version": "1.08/2.11"
},
{
"model": "plc sailor series mfhf vhf",
"scope": "eq",
"trust": 0.3,
"vendor": "cobham",
"version": "9001.08/2.11"
},
{
"model": "plc sailor series mfhf vhf",
"scope": "eq",
"trust": 0.3,
"vendor": "cobham",
"version": "60001.08/2.11"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#460687"
},
{
"db": "CNVD",
"id": "CNVD-2014-04962"
},
{
"db": "BID",
"id": "69141"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-003713"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-147"
},
{
"db": "NVD",
"id": "CVE-2014-2940"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:cobham:sailor_6000_series_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cobham:sailor_6006_message_terminal",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cobham:sailor_6110_mini-c_gmdss",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cobham:sailor_6222_vhf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cobham:sailor_6300_mf_%2F_hf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cobham:sailor_900_vsat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cobham:sailor_900_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-003713"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ruben Santamarta",
"sources": [
{
"db": "BID",
"id": "69141"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-147"
}
],
"trust": 0.9
},
"cve": "CVE-2014-2940",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2014-2940",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT DEFINED",
"baseScore": 10.0,
"collateralDamagePotential": "NONE",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT DEFINED",
"enviromentalScore": 2.0,
"exploitability": "PROOF-OF-CONCEPT",
"exploitabilityScore": 10.0,
"id": "CVE-2014-2940",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT DEFINED",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"remediationLevel": "NOT DEFINED",
"reportConfidence": "UNCOFIRMED",
"severity": "HIGH",
"targetDistribution": "LOW",
"trust": 0.8,
"userInteractionRequired": null,
"vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "JVNDB-2014-003713",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2014-04962",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-70879",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-2940",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2014-2940",
"trust": 0.8,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2014-003713",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2014-04962",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201408-147",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-70879",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#460687"
},
{
"db": "CNVD",
"id": "CNVD-2014-04962"
},
{
"db": "VULHUB",
"id": "VHN-70879"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-003713"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-147"
},
{
"db": "NVD",
"id": "CVE-2014-2940"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cobham Sailor 900 and 6000 satellite terminals with firmware 1.08 MFHF and 2.11 VHF have hardcoded credentials for the administrator account, which allows attackers to obtain administrative control by leveraging physical access or terminal access. Cobham Sailor 900 and 6000 series satellite terminals contain hardcoded credentials. CWE-798: Use of Hard-coded Credentials https://cwe.mitre.org/data/definitions/798.htmlA remote attacker could control the device. An attacker could exploit the vulnerability to bypass the authentication mechanism and gain access to the affected device. \nCobham Sailor firmware version 1.08 MFHF / 2.11 VHF is vulnerable; other versions are also affected",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2940"
},
{
"db": "CERT/CC",
"id": "VU#460687"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-003713"
},
{
"db": "CNVD",
"id": "CNVD-2014-04962"
},
{
"db": "BID",
"id": "69141"
},
{
"db": "VULHUB",
"id": "VHN-70879"
}
],
"trust": 3.24
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.kb.cert.org/vuls/id/460687",
"trust": 0.8,
"type": "poc"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#460687"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#460687",
"trust": 3.6
},
{
"db": "NVD",
"id": "CVE-2014-2940",
"trust": 3.4
},
{
"db": "BID",
"id": "69141",
"trust": 1.6
},
{
"db": "JVN",
"id": "JVNVU95202843",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2014-003713",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201408-147",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2014-04962",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-70879",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#460687"
},
{
"db": "CNVD",
"id": "CNVD-2014-04962"
},
{
"db": "VULHUB",
"id": "VHN-70879"
},
{
"db": "BID",
"id": "69141"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-003713"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-147"
},
{
"db": "NVD",
"id": "CVE-2014-2940"
}
]
},
"id": "VAR-201408-0277",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-04962"
},
{
"db": "VULHUB",
"id": "VHN-70879"
}
],
"trust": 1.7
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-04962"
}
]
},
"last_update_date": "2025-04-13T23:21:25.330000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Aerospace and Security, SATCOM, Inmarsat FleetBroadband:",
"trust": 0.8,
"url": "http://www.cobham.com/about-cobham/aerospace-and-security/about-us/satcom/satellite-communication-at-sea/products-and-services/inmarsat-fleetbroadband.aspx"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-003713"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-003713"
},
{
"db": "NVD",
"id": "CVE-2014-2940"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "http://www.kb.cert.org/vuls/id/460687"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/bid/69141"
},
{
"trust": 1.1,
"url": "http://www.cobham.com/about-cobham/aerospace-and-security/about-us/satcom/satellite-communication-at-sea/products-and-services/inmarsat-fleetbroadband.aspx"
},
{
"trust": 0.8,
"url": "http://cwe.mitre.org/data/definitions/798.html"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2940"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu95202843/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2940"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#460687"
},
{
"db": "CNVD",
"id": "CNVD-2014-04962"
},
{
"db": "VULHUB",
"id": "VHN-70879"
},
{
"db": "BID",
"id": "69141"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-003713"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-147"
},
{
"db": "NVD",
"id": "CVE-2014-2940"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#460687"
},
{
"db": "CNVD",
"id": "CNVD-2014-04962"
},
{
"db": "VULHUB",
"id": "VHN-70879"
},
{
"db": "BID",
"id": "69141"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-003713"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-147"
},
{
"db": "NVD",
"id": "CVE-2014-2940"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-08-07T00:00:00",
"db": "CERT/CC",
"id": "VU#460687"
},
{
"date": "2014-08-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-04962"
},
{
"date": "2014-08-15T00:00:00",
"db": "VULHUB",
"id": "VHN-70879"
},
{
"date": "2014-08-07T00:00:00",
"db": "BID",
"id": "69141"
},
{
"date": "2014-08-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-003713"
},
{
"date": "2014-08-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201408-147"
},
{
"date": "2014-08-15T11:15:42.950000",
"db": "NVD",
"id": "CVE-2014-2940"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-08-14T00:00:00",
"db": "CERT/CC",
"id": "VU#460687"
},
{
"date": "2014-08-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-04962"
},
{
"date": "2014-08-15T00:00:00",
"db": "VULHUB",
"id": "VHN-70879"
},
{
"date": "2014-08-07T00:00:00",
"db": "BID",
"id": "69141"
},
{
"date": "2014-08-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-003713"
},
{
"date": "2014-09-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201408-147"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2014-2940"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201408-147"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cobham Sailor Satellite Terminals Security Bypass Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-04962"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-147"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201408-147"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…