fkie_cve-2013-6650
Vulnerability from fkie_nvd
Published
2014-01-28 14:30
Modified
2025-04-11 00:51
Severity ?
Summary
The StoreBuffer::ExemptPopularPages function in store-buffer.cc in Google V8 before 3.22.24.16, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors that trigger incorrect handling of "popular pages."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
chrome | * | ||
chrome | 32.0.1700.0 | ||
chrome | 32.0.1700.2 | ||
chrome | 32.0.1700.3 | ||
chrome | 32.0.1700.4 | ||
chrome | 32.0.1700.5 | ||
chrome | 32.0.1700.6 | ||
chrome | 32.0.1700.7 | ||
chrome | 32.0.1700.8 | ||
chrome | 32.0.1700.9 | ||
chrome | 32.0.1700.10 | ||
chrome | 32.0.1700.11 | ||
chrome | 32.0.1700.12 | ||
chrome | 32.0.1700.13 | ||
chrome | 32.0.1700.14 | ||
chrome | 32.0.1700.15 | ||
chrome | 32.0.1700.16 | ||
chrome | 32.0.1700.17 | ||
chrome | 32.0.1700.18 | ||
chrome | 32.0.1700.19 | ||
chrome | 32.0.1700.21 | ||
chrome | 32.0.1700.22 | ||
chrome | 32.0.1700.23 | ||
chrome | 32.0.1700.24 | ||
chrome | 32.0.1700.26 | ||
chrome | 32.0.1700.27 | ||
chrome | 32.0.1700.28 | ||
chrome | 32.0.1700.29 | ||
chrome | 32.0.1700.30 | ||
chrome | 32.0.1700.31 | ||
chrome | 32.0.1700.32 | ||
chrome | 32.0.1700.33 | ||
chrome | 32.0.1700.34 | ||
chrome | 32.0.1700.35 | ||
chrome | 32.0.1700.38 | ||
chrome | 32.0.1700.39 | ||
chrome | 32.0.1700.41 | ||
chrome | 32.0.1700.50 | ||
chrome | 32.0.1700.51 | ||
chrome | 32.0.1700.52 | ||
chrome | 32.0.1700.53 | ||
chrome | 32.0.1700.54 | ||
chrome | 32.0.1700.55 | ||
chrome | 32.0.1700.56 | ||
chrome | 32.0.1700.57 | ||
chrome | 32.0.1700.58 | ||
chrome | 32.0.1700.59 | ||
chrome | 32.0.1700.62 | ||
chrome | 32.0.1700.63 | ||
chrome | 32.0.1700.64 | ||
chrome | 32.0.1700.65 | ||
chrome | 32.0.1700.66 | ||
chrome | 32.0.1700.67 | ||
chrome | 32.0.1700.68 | ||
chrome | 32.0.1700.69 | ||
chrome | 32.0.1700.70 | ||
chrome | 32.0.1700.71 | ||
chrome | 32.0.1700.72 | ||
chrome | 32.0.1700.74 | ||
chrome | 32.0.1700.75 | ||
chrome | 32.0.1700.76 | ||
chrome | 32.0.1700.77 | ||
chrome | 32.0.1700.94 | ||
chrome | 32.0.1700.95 | ||
chrome | 32.0.1700.96 | ||
chrome | 32.0.1700.97 | ||
chrome | 32.0.1700.98 | ||
chrome | 32.0.1700.99 | ||
chrome | 32.0.1700.100 | ||
opensuse | opensuse | 12.3 | |
opensuse | opensuse | 13.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "C09FC000-DD26-480F-B2B8-6C6F7C9D169D", "versionEndIncluding": "32.0.1700.101", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.0:*:*:*:*:*:*:*", "matchCriteriaId": "FD924DBF-E249-438D-BA2F-3C0BACD414C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.2:*:*:*:*:*:*:*", "matchCriteriaId": "2933E363-BBA2-4997-B9AA-CDEA26C03EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.3:*:*:*:*:*:*:*", "matchCriteriaId": "95EBFD73-F2E0-471F-A523-0EEC46838248", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.4:*:*:*:*:*:*:*", "matchCriteriaId": "90C6D8E5-7DA6-4903-AF1B-58DC2EDE38F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.5:*:*:*:*:*:*:*", "matchCriteriaId": "E51C592D-A265-4B31-A819-E4C4F641F369", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B4D8BFF-466D-4CC5-BE6D-1E8BB13152CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.7:*:*:*:*:*:*:*", "matchCriteriaId": "6F37F40B-E221-4004-AE4C-7278F4790E7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.8:*:*:*:*:*:*:*", "matchCriteriaId": "F0B32A24-627C-43B3-B449-4889D07E33A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.9:*:*:*:*:*:*:*", "matchCriteriaId": "5BEBE1C4-591F-4964-A8E4-B568F15B9A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.10:*:*:*:*:*:*:*", "matchCriteriaId": "3EE2DEA2-C061-4656-9B0F-DB929256C277", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.11:*:*:*:*:*:*:*", "matchCriteriaId": "F50887B9-7FF7-40A2-BAC5-62B6FF9CEB92", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.12:*:*:*:*:*:*:*", "matchCriteriaId": "75BE8557-F16D-46B9-8B62-7F8D52AEA11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.13:*:*:*:*:*:*:*", "matchCriteriaId": "CBDC0D0A-7FF3-4B36-82D5-85589E81C9EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.14:*:*:*:*:*:*:*", "matchCriteriaId": "43E026DE-9409-47F1-A025-A27B3A9B7C7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.15:*:*:*:*:*:*:*", "matchCriteriaId": "07AF7FAC-1199-4C54-827F-3D393BBDC378", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.16:*:*:*:*:*:*:*", "matchCriteriaId": "80024D3E-1CDC-400B-A472-7C80607E8E83", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.17:*:*:*:*:*:*:*", "matchCriteriaId": "6ECF96A3-6D1E-4EF5-8C15-3B56CBD66E1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.18:*:*:*:*:*:*:*", "matchCriteriaId": "84D88DB7-F6DF-43BA-8259-FEB9EE68AB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.19:*:*:*:*:*:*:*", "matchCriteriaId": "C65F6423-4B98-468D-AE3F-371B557BBCBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.21:*:*:*:*:*:*:*", "matchCriteriaId": "862CB0B0-BD74-4DF0-A01C-CAAB376A3DD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.22:*:*:*:*:*:*:*", "matchCriteriaId": "F61BAD72-0D19-4065-A209-E8F608EE3393", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.23:*:*:*:*:*:*:*", "matchCriteriaId": "39555F26-B98C-4116-B58C-ABD3FFA8D3FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.24:*:*:*:*:*:*:*", "matchCriteriaId": "19493290-8C67-4BBC-85EF-31941711443E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.26:*:*:*:*:*:*:*", "matchCriteriaId": "485F2654-C86B-4270-9B0D-878B23E4A06F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.27:*:*:*:*:*:*:*", "matchCriteriaId": "FF42F96A-120A-4637-8AD3-9CCFD8A185FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.28:*:*:*:*:*:*:*", "matchCriteriaId": "1E513EEE-4CC1-470F-A729-1F949720F6AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.29:*:*:*:*:*:*:*", "matchCriteriaId": "2B135F7E-E68B-4FDB-96B9-45E920A9FAB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.30:*:*:*:*:*:*:*", "matchCriteriaId": "0F3EFD4E-DE0C-4043-B607-3120A728AAB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.31:*:*:*:*:*:*:*", "matchCriteriaId": "BF7547FA-E82F-4E9E-AF6C-5A334A7CEAB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.32:*:*:*:*:*:*:*", "matchCriteriaId": "3F1DDC7C-DFA6-4CF6-89E9-FDA0CD9F13D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.33:*:*:*:*:*:*:*", "matchCriteriaId": "17DFD87F-5F8A-4D61-80AA-B3915378989D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.34:*:*:*:*:*:*:*", "matchCriteriaId": "779ADDB1-A249-4044-8879-C242E5169308", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.35:*:*:*:*:*:*:*", "matchCriteriaId": "0A3E8EAB-8EBC-475A-BF2A-F26803ECA550", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.38:*:*:*:*:*:*:*", "matchCriteriaId": "E70483EC-39D3-4195-9CDA-E51493A62C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.39:*:*:*:*:*:*:*", "matchCriteriaId": "37FE96DD-3B47-4700-9CF1-9F4E8808464C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.41:*:*:*:*:*:*:*", "matchCriteriaId": "F24F0E17-97FB-4817-A435-1F4DFD2405FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.50:*:*:*:*:*:*:*", "matchCriteriaId": "3042C392-8F37-48A8-9AA2-BD7B54C34681", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.51:*:*:*:*:*:*:*", "matchCriteriaId": "69A55CC7-C7EB-4920-A352-DEBBFE0C4DDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.52:*:*:*:*:*:*:*", "matchCriteriaId": "8816D214-468E-45B3-B9E0-4C7C47D0CF9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.53:*:*:*:*:*:*:*", "matchCriteriaId": "A0E56356-B560-4608-B9A8-19621F1FC243", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.54:*:*:*:*:*:*:*", "matchCriteriaId": "9BC53165-76C8-4F29-A22E-98102159835C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.55:*:*:*:*:*:*:*", "matchCriteriaId": "73D7800D-0E74-4726-887E-80C8A08EF88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.56:*:*:*:*:*:*:*", "matchCriteriaId": "260AD062-8509-4822-B5E8-FF126148CD9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.57:*:*:*:*:*:*:*", "matchCriteriaId": "7CC9BFF7-28AE-4D05-8405-0CD6A4CF199A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.58:*:*:*:*:*:*:*", "matchCriteriaId": "FA54E045-6D92-479F-B8BB-D578C987EDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.59:*:*:*:*:*:*:*", "matchCriteriaId": "38088242-60F9-4A19-9FE7-E63A7A70A6D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.62:*:*:*:*:*:*:*", "matchCriteriaId": "978BFA68-736E-45C8-AD6B-93C20187DDCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.63:*:*:*:*:*:*:*", "matchCriteriaId": "51641C25-6D29-46A2-BEA4-92FA63800B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.64:*:*:*:*:*:*:*", "matchCriteriaId": "8080D81C-456B-4912-B023-F40CD63C1E31", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.65:*:*:*:*:*:*:*", "matchCriteriaId": "AF8B2DEA-4324-4B96-9138-5BD835713191", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.66:*:*:*:*:*:*:*", "matchCriteriaId": "9DCC1343-D62F-44C1-8A1B-6A449424F9B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.67:*:*:*:*:*:*:*", "matchCriteriaId": "B0673B28-DEB0-4DB8-95B9-4342CB30E8C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.68:*:*:*:*:*:*:*", "matchCriteriaId": "16884FC4-C67D-4F30-8207-D4E464676248", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.69:*:*:*:*:*:*:*", "matchCriteriaId": "EA14BCBC-7F1C-449F-80FA-0E5F6CFB66CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.70:*:*:*:*:*:*:*", "matchCriteriaId": "47140ACB-D48B-41EB-BBE7-09226FE85C3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.71:*:*:*:*:*:*:*", "matchCriteriaId": "BD9942E5-BCC5-49FA-BD6C-A8E6DED252DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.72:*:*:*:*:*:*:*", "matchCriteriaId": "1187F67E-A665-48C8-A2CC-83A7E7A593BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.74:*:*:*:*:*:*:*", "matchCriteriaId": "6CCBDEF8-5EBA-413A-994E-820A84A4C9CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.75:*:*:*:*:*:*:*", "matchCriteriaId": "46DF9112-2DA6-4BA0-83CD-54623A5EC640", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.76:*:*:*:*:*:*:*", "matchCriteriaId": "11B6273A-746F-48D7-A59D-6CE87BF9BBF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.77:*:*:*:*:*:*:*", "matchCriteriaId": "4DF6A0B0-C052-4345-AE73-9C5B63F50354", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.94:*:*:*:*:*:*:*", "matchCriteriaId": "0FD10821-8B98-466D-98F6-4942DF59416F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.95:*:*:*:*:*:*:*", "matchCriteriaId": "D932062A-8336-4349-AFE4-7D277E020BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.96:*:*:*:*:*:*:*", "matchCriteriaId": "7922F9B2-C15B-441B-BC9C-4591652BE16D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.97:*:*:*:*:*:*:*", "matchCriteriaId": "DA0B42A0-73B3-4EF8-9C56-6A820EF2CB0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.98:*:*:*:*:*:*:*", "matchCriteriaId": "B3EF1D80-D086-4308-B229-D146A88B5D04", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.99:*:*:*:*:*:*:*", "matchCriteriaId": "8C159F4D-E92D-4879-9A6B-56CFB68C683C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:32.0.1700.100:*:*:*:*:*:*:*", "matchCriteriaId": "4CA241EB-7213-4815-A46E-866F4568C8DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The StoreBuffer::ExemptPopularPages function in store-buffer.cc in Google V8 before 3.22.24.16, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors that trigger incorrect handling of \"popular pages.\"" }, { "lang": "es", "value": "La funci\u00f3n StoreBuffer::ExemptPopularPages en store-buffer.cc de Google V8 anterior a la versi\u00f3n 3.22.24.16, tal y como se usa en Google Chrome anterior a la versi\u00f3n 32.0.1700.102, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente tener otro impacto no especificado a trav\u00e9s de vectores que desencadenen un manejo incorrecto de \"p\u00e1ginas populares.\"" } ], "id": "CVE-2013-6650", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-01-28T14:30:39.497", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://crbug.com/331444" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2014/01/stable-channel-update_27.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-2862" }, { "source": "cve@mitre.org", "url": "https://code.google.com/p/v8/source/detail?r=18483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://crbug.com/331444" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2014/01/stable-channel-update_27.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-2862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/v8/source/detail?r=18483" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…