fkie_cve-2012-4437
Vulnerability from fkie_nvd
Published
2012-10-01 03:26
Modified
2024-11-21 01:42
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F60BF56B-7165-456C-B7D1-AF6E869B7337", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "53A4DCB2-AD64-4BD8-99AD-5D8AEB42240A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "A46B316A-0D93-4B17-AFF7-C52FFFF361FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "3DC9CDED-796C-4081-83DD-7AE59700FF39", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0AA427E6-AE83-4227-B45B-BD84569ACA2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8C8DB2D9-9D3D-4F01-869F-AA5BEB2891DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9FE6E86E-623A-4136-9945-1E99629916B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A55A97A-FD19-4385-92D7-D511D53EE38C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8F7BBD2A-45A1-4C98-9C73-DBBF2161BE29", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CB86C08-AE24-4B3C-90FE-917996A0A48C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "DADDE896-B711-4ECD-B560-E9665B178173", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "293032B8-72CB-4201-901E-3A70613B7518", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA2F1ACE-C3BD-4DEA-A317-38CD4928A781", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "469D55FF-5436-4000-8FF3-B3761761A429", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "34C390AB-D6A6-4ABF-AA1E-A9294AC2FD70", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "21D02454-647C-43B9-9DAC-A0306FB52F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FF0159CD-A5A9-4C7A-9EDC-9A6BC8740847", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "AB73E7D4-A784-41EF-8DC8-3BF9245A549D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "0BD8A9C9-FFA8-46E8-874C-F5A31A785102", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "FE74F83B-33BB-4303-A022-51422BFBB8C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "D780E5BB-4DC5-4E7C-A1B5-FE6E9E75B5D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "0CE55049-426E-4B43-8A55-A643B423A921", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "88CDDA12-5690-442E-A893-47E9E2E60617", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D731309D-2418-4382-B565-E74C4593527F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "3C9A9770-5A48-45D8-A3E3-16867CED4B2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en la clase SmartyException en Smarty (tambi\u00e9n conocido como smarty-php), antes de v3.1.12, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados que desencadenan una excepci\u00f3n Smarty." } ], "id": "CVE-2012-4437", "lastModified": "2024-11-21T01:42:53.733", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-10-01T03:26:16.413", "references": [ { "source": "secalert@redhat.com", "url": "http://advisories.mageia.org/MGASA-2014-0468.html" }, { "source": "secalert@redhat.com", "url": "http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=4658" }, { "source": "secalert@redhat.com", "url": "http://jvn.jp/en/jp/JVN63650108/index.html" }, { "source": "secalert@redhat.com", "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/50589" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/09/19/1" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/09/20/3" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/55506" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2014-0468.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=4658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN63650108/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/50589" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/09/19/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/09/20/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/55506" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.