cve-2009-2481
Vulnerability from cvelistv5
Published
2009-07-16 16:00
Modified
2024-08-07 05:52
Severity ?
Summary
mt-wizard.cgi in Six Apart Movable Type before 4.261, when global templates are not initialized, allows remote attackers to bypass access restrictions and (1) send e-mail to arbitrary addresses or (2) obtain sensitive information via unspecified vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:52:14.744Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#08369659",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN08369659/index.html"
          },
          {
            "name": "35534",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35534"
          },
          {
            "name": "ADV-2009-1668",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1668"
          },
          {
            "name": "JVNDB-2009-000043",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000043.html"
          },
          {
            "name": "35471",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35471"
          },
          {
            "name": "movabletype-mtwizard-security-bypass(51330)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51330"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-06-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "mt-wizard.cgi in Six Apart Movable Type before 4.261, when global templates are not initialized, allows remote attackers to bypass access restrictions and (1) send e-mail to arbitrary addresses or (2) obtain sensitive information via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "JVN#08369659",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN08369659/index.html"
        },
        {
          "name": "35534",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35534"
        },
        {
          "name": "ADV-2009-1668",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1668"
        },
        {
          "name": "JVNDB-2009-000043",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000043.html"
        },
        {
          "name": "35471",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35471"
        },
        {
          "name": "movabletype-mtwizard-security-bypass(51330)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51330"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2481",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "mt-wizard.cgi in Six Apart Movable Type before 4.261, when global templates are not initialized, allows remote attackers to bypass access restrictions and (1) send e-mail to arbitrary addresses or (2) obtain sensitive information via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#08369659",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN08369659/index.html"
            },
            {
              "name": "35534",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35534"
            },
            {
              "name": "ADV-2009-1668",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1668"
            },
            {
              "name": "JVNDB-2009-000043",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000043.html"
            },
            {
              "name": "35471",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35471"
            },
            {
              "name": "movabletype-mtwizard-security-bypass(51330)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51330"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2481",
    "datePublished": "2009-07-16T16:00:00",
    "dateReserved": "2009-07-16T00:00:00",
    "dateUpdated": "2024-08-07T05:52:14.744Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-2481\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-07-16T16:30:00.420\",\"lastModified\":\"2024-11-21T01:04:58.773\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"mt-wizard.cgi in Six Apart Movable Type before 4.261, when global templates are not initialized, allows remote attackers to bypass access restrictions and (1) send e-mail to arbitrary addresses or (2) obtain sensitive information via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"El archivo mt-wizard.cgi en Movable Type de Six Apart  anterior a versi\u00f3n 4.261, cuando las plantillas globales no se inicializan, permite a los atacantes remotos omitir las restricciones de acceso y (1) enviar correo electr\u00f3nico a direcciones arbitrarias o (2) obtener informaci\u00f3n confidencial por medio de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"},{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:1.54:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"56106A34-006E-4B73-B6C6-3F36E9C2A355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1731B0E-71C0-4650-BFBF-1FB3865EAE76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:2.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C057E938-243B-4BEE-BF38-F3334A2B9275\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE37614D-A959-4B4A-BF2E-9F3C1072BA20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C1542C3-E6CD-4CF6-9F1D-E8E58F2A11E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47F63E3A-019C-431C-A155-1CD6E42FA485\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13132B94-C271-46F7-9450-FBA1FCBB914E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B584BED2-F630-4A5B-8FE9-29BBE9517214\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.36:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"14FCDA0F-2562-4B58-BF3A-F908AFABC557\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C55BC3C3-83AB-452C-AC2D-A53B3E0C3473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4.20:*:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"C4EFB50C-CC9C-46EC-92C3-A581684354E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4.20:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"E7FEAC67-FA0C-49AE-9AEB-B1E68FB54C8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4.20:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"321A94B3-CDAC-4793-9660-CDCDC614EBAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDDB2948-C902-43FC-9D2E-7EA3775F5A50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.26\",\"matchCriteriaId\":\"230918F1-5CCE-4A03-ABFD-5EF0BC59DF32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.00:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"B1A33E50-6BFD-418F-9F3E-B42C013AA0F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.1:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"DC0F1B54-554E-45C7-8943-A73086C88385\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.2:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"A56CDA00-DC8E-4042-A882-FB6D7D2F43B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.3:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"1C8F4F3A-9942-4263-BC42-CDCDACDFF2E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.4:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"38626110-81A0-4C99-AB8F-D77FDF662887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.5:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"5212ADBE-9F50-4EAB-AC28-91314AA24595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.31:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"3542C36E-E457-46DD-A5F7-BD22E16F1C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.0d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"461319CC-BCDC-4E24-B384-1EEC8B7C4596\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"967DAF27-D561-4FDB-A65C-788551871E5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.01d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD460D1D-5971-491E-863A-D230A0B28ED4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BC178AF-FAF7-49E2-8AE7-1858BD67F44B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CEA1C54-4636-44B1-B620-85F0D870797E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1819A7A1-366A-4168-AE0E-4CE1FF0D3E3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F743E8-72E9-4AEB-B137-A61EB67B8FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE92182C-5BBE-4FCD-959B-E95630D16E17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99E9BE91-D42E-4523-A48E-E7B4FBE7A924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C5935CA-FDE2-4300-8091-DBD0DC4D2081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF080128-CC7C-4F71-9268-B7691D54F358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4783C1BD-B2BA-4D86-A61D-3EB2396DE1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50782308-93FA-4F8F-93FB-4A4E55D95360\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5C968A9-F07A-4C99-B4A5-434E96DDB928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9CD9174-EE47-40B8-8F49-81EAD89267D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"B4FEB07E-4D70-4A24-822E-E4689CB8C9CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"59457028-2EA4-472F-A76F-EF867F48937F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.01:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"ABE24C88-6062-4A36-9852-D9EC818EEA0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.1:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"11C793FA-AE7C-430F-B537-19B788D9BC6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.1:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"F80A607A-66A8-4995-A396-5487B8E3029C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.01:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"C3C21088-A9A5-4CE2-B4D7-8BC48DB84540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.01:b:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"C1DCAD70-9FFF-4950-875D-586937E93473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.01:b:pro:*:*:*:*:*\",\"matchCriteriaId\":\"395B9CE4-EA3A-42A1-AD37-6487911E10D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56195FCE-D933-40C6-A6A3-6AC8CFECA5DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.2:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"448081A9-A8C9-4FEC-879B-7FA11997B4D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.2:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"E7538776-B7B2-4912-BFE3-E7A1033F41E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.12:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"F33F4F69-D670-4698-84C6-EDD9D78F2D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.12:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"1E481C6C-F6EF-4E7D-8DAF-F68407DE6501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AD39A71-0B61-4319-BEE1-12CAD4B095A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.21:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"23B5D056-BC56-4851-8E76-7E22C911EEFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.21:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"CA9BC769-BE45-42EC-8E35-02E6B216D6E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B49D8B0-39C9-480B-9471-1846CE5A2142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.23:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"9A1B400B-FEC9-416B-89F2-C96B1BE11BF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.23:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"1458F0E9-6AF1-44C6-B0EC-7BCF314B0038\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A200E33-641A-41B3-8EB3-E7380B686C8C\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN08369659/index.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000043.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35534\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/35471\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1668\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/51330\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvn.jp/en/jp/JVN08369659/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000043.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35534\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/35471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1668\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/51330\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.