CVE-2006-3227 (GCVE-0-2006-3227)

Vulnerability from cvelistv5 – Published: 2006-06-26 16:00 – Updated: 2024-08-07 18:23
VLAI?
Summary
Interpretation conflict between Internet Explorer and other web browsers such as Mozilla, Opera, and Firefox might allow remote attackers to modify the visual presentation of web pages and possibly bypass protection mechanisms such as content filters via ASCII characters with the 8th bit set, which could be stripped by Internet Explorer to render legible text, but not when using other browsers. NOTE: there has been significant discussion about this issue, and as of 20060625, it is not clear where the responsibility for this issue lies, although it might be due to vagueness within the associated standards. NOTE: this might only be exploitable with certain encodings.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:23:20.459Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20060621 Re: Bypassing of web filters by using ASCII",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438051/100/0/threaded"
          },
          {
            "name": "ie-ascii-encoded-web-filter-bypass(27288)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27288"
          },
          {
            "name": "20060623 Re: Bypassing of web filters by using ASCII",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438163/100/0/threaded"
          },
          {
            "name": "20060626 Re: Bypassing of web filters by using ASCII",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438358/100/0/threaded"
          },
          {
            "name": "20060622 Re: Bypassing of web filters by using ASCII",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438066/100/0/threaded"
          },
          {
            "name": "20060621 Bypassing of web filters by using ASCII",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/437948/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2"
          },
          {
            "name": "20060621 Re: Bypassing of web filters by using ASCII",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438049/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters/"
          },
          {
            "name": "20060623 RE: Bypassing of web filters by using ASCII",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438154/100/0/threaded"
          },
          {
            "name": "20060626 RE: Bypassing of web filters by using ASCII",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438359/100/0/threaded"
          },
          {
            "name": "28376",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/28376"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-06-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Interpretation conflict between Internet Explorer and other web browsers such as Mozilla, Opera, and Firefox might allow remote attackers to modify the visual presentation of web pages and possibly bypass protection mechanisms such as content filters via ASCII characters with the 8th bit set, which could be stripped by Internet Explorer to render legible text, but not when using other browsers. NOTE: there has been significant discussion about this issue, and as of 20060625, it is not clear where the responsibility for this issue lies, although it might be due to vagueness within the associated standards.  NOTE: this might only be exploitable with certain encodings."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20060621 Re: Bypassing of web filters by using ASCII",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438051/100/0/threaded"
        },
        {
          "name": "ie-ascii-encoded-web-filter-bypass(27288)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27288"
        },
        {
          "name": "20060623 Re: Bypassing of web filters by using ASCII",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438163/100/0/threaded"
        },
        {
          "name": "20060626 Re: Bypassing of web filters by using ASCII",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438358/100/0/threaded"
        },
        {
          "name": "20060622 Re: Bypassing of web filters by using ASCII",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438066/100/0/threaded"
        },
        {
          "name": "20060621 Bypassing of web filters by using ASCII",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/437948/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2"
        },
        {
          "name": "20060621 Re: Bypassing of web filters by using ASCII",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438049/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters/"
        },
        {
          "name": "20060623 RE: Bypassing of web filters by using ASCII",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438154/100/0/threaded"
        },
        {
          "name": "20060626 RE: Bypassing of web filters by using ASCII",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438359/100/0/threaded"
        },
        {
          "name": "28376",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/28376"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-3227",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Interpretation conflict between Internet Explorer and other web browsers such as Mozilla, Opera, and Firefox might allow remote attackers to modify the visual presentation of web pages and possibly bypass protection mechanisms such as content filters via ASCII characters with the 8th bit set, which could be stripped by Internet Explorer to render legible text, but not when using other browsers. NOTE: there has been significant discussion about this issue, and as of 20060625, it is not clear where the responsibility for this issue lies, although it might be due to vagueness within the associated standards.  NOTE: this might only be exploitable with certain encodings."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20060621 Re: Bypassing of web filters by using ASCII",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438051/100/0/threaded"
            },
            {
              "name": "ie-ascii-encoded-web-filter-bypass(27288)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27288"
            },
            {
              "name": "20060623 Re: Bypassing of web filters by using ASCII",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438163/100/0/threaded"
            },
            {
              "name": "20060626 Re: Bypassing of web filters by using ASCII",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438358/100/0/threaded"
            },
            {
              "name": "20060622 Re: Bypassing of web filters by using ASCII",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438066/100/0/threaded"
            },
            {
              "name": "20060621 Bypassing of web filters by using ASCII",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/437948/100/0/threaded"
            },
            {
              "name": "http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2",
              "refsource": "MISC",
              "url": "http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2"
            },
            {
              "name": "20060621 Re: Bypassing of web filters by using ASCII",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438049/100/0/threaded"
            },
            {
              "name": "http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters/",
              "refsource": "MISC",
              "url": "http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters/"
            },
            {
              "name": "20060623 RE: Bypassing of web filters by using ASCII",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438154/100/0/threaded"
            },
            {
              "name": "20060626 RE: Bypassing of web filters by using ASCII",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438359/100/0/threaded"
            },
            {
              "name": "28376",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/28376"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-3227",
    "datePublished": "2006-06-26T16:00:00",
    "dateReserved": "2006-06-26T00:00:00",
    "dateUpdated": "2024-08-07T18:23:20.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:internet_explorer:6.0.2900:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B90EA4B-DA10-44B7-BD3D-6AE1197212D5\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Interpretation conflict between Internet Explorer and other web browsers such as Mozilla, Opera, and Firefox might allow remote attackers to modify the visual presentation of web pages and possibly bypass protection mechanisms such as content filters via ASCII characters with the 8th bit set, which could be stripped by Internet Explorer to render legible text, but not when using other browsers. NOTE: there has been significant discussion about this issue, and as of 20060625, it is not clear where the responsibility for this issue lies, although it might be due to vagueness within the associated standards.  NOTE: this might only be exploitable with certain encodings.\"}, {\"lang\": \"es\", \"value\": \"Conflictos de interpretaci\\u00f3n entre Internet Explorer y otros buscadores web como Mozilla, Opera, y Firefox pued e permitir a atacantes remotos modificar la presentaci\\u00f3n de las p\\u00e1ginas web y probablemente superar los mecanismos de protecci\\u00f3n como los filtros e contenido a trav\\u00e9s de caracteres ASCII con el octavo bit configurado, lo que puede ser desecho por Internet Explorer para traducir texto legible, pero no cuando es usado en otros buscaodres. NOTA: ha habido discursi\\u00f3n significativa sobre este tema, como 20060625, no est\\u00e1 claro donde se encuentra la responsabilidad de este problema, aunque podr\\u00eda ser debido a la vaguedad dentro de los est\\u00e1ndares asociados. NOTA: esto s\\u00f3lo puede ser objeto de explotaci\\u00f3n con ciertas codificaciones.\"}]",
      "id": "CVE-2006-3227",
      "lastModified": "2024-11-21T00:13:07.170",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:N/I:P/A:N\", \"baseScore\": 2.6, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 4.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2006-06-26T16:05:00.000",
      "references": "[{\"url\": \"http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/28376\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/437948/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438049/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438051/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438066/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438154/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438163/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438358/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438359/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/27288\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/28376\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/437948/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438049/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438051/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438066/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438154/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438163/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438358/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438359/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/27288\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2006-3227\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-06-26T16:05:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Interpretation conflict between Internet Explorer and other web browsers such as Mozilla, Opera, and Firefox might allow remote attackers to modify the visual presentation of web pages and possibly bypass protection mechanisms such as content filters via ASCII characters with the 8th bit set, which could be stripped by Internet Explorer to render legible text, but not when using other browsers. NOTE: there has been significant discussion about this issue, and as of 20060625, it is not clear where the responsibility for this issue lies, although it might be due to vagueness within the associated standards.  NOTE: this might only be exploitable with certain encodings.\"},{\"lang\":\"es\",\"value\":\"Conflictos de interpretaci\u00f3n entre Internet Explorer y otros buscadores web como Mozilla, Opera, y Firefox pued e permitir a atacantes remotos modificar la presentaci\u00f3n de las p\u00e1ginas web y probablemente superar los mecanismos de protecci\u00f3n como los filtros e contenido a trav\u00e9s de caracteres ASCII con el octavo bit configurado, lo que puede ser desecho por Internet Explorer para traducir texto legible, pero no cuando es usado en otros buscaodres. NOTA: ha habido discursi\u00f3n significativa sobre este tema, como 20060625, no est\u00e1 claro donde se encuentra la responsabilidad de este problema, aunque podr\u00eda ser debido a la vaguedad dentro de los est\u00e1ndares asociados. NOTA: esto s\u00f3lo puede ser objeto de explotaci\u00f3n con ciertas codificaciones.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:P/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:internet_explorer:6.0.2900:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B90EA4B-DA10-44B7-BD3D-6AE1197212D5\"}]}]}],\"references\":[{\"url\":\"http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/28376\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/437948/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/438049/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/438051/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/438066/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/438154/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/438163/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/438358/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/438359/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27288\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/28376\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/437948/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/438049/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/438051/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/438066/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/438154/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/438163/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/438358/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/438359/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27288\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…