fkie_cve-2012-6073
Vulnerability from fkie_nvd
Published
2013-02-24 22:55
Modified
2024-11-21 01:45
Severity ?
Summary
Open redirect vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
Impacted products
Vendor Product Version
cloudbees jenkins 1.447.1.1
cloudbees jenkins 1.447.2.2
cloudbees jenkins 1.447.3.1
cloudbees jenkins 1.400
cloudbees jenkins 1.424
cloudbees jenkins 1.447
jenkins jenkins *
jenkins jenkins 1.409.1
jenkins jenkins 1.409.2
jenkins jenkins 1.409.3
jenkins jenkins 1.424.1
jenkins jenkins 1.424.2
jenkins jenkins 1.424.3
jenkins jenkins 1.424.4
jenkins jenkins 1.424.5
jenkins jenkins 1.424.6
jenkins jenkins 1.447.1
jenkins jenkins 1.447.2
jenkins jenkins 1.466.1
cloudbees jenkins 1.424.0.2
cloudbees jenkins 1.424.0.4
cloudbees jenkins 1.424.1.1
cloudbees jenkins 1.424.2.1
cloudbees jenkins 1.424.4.1
cloudbees jenkins 1.424.5.1
cloudbees jenkins 1.424.6.1
cloudbees jenkins 1.424.6.11
cloudbees jenkins *
jenkins jenkins 1.400
jenkins jenkins 1.401
jenkins jenkins 1.402
jenkins jenkins 1.403
jenkins jenkins 1.404
jenkins jenkins 1.405
jenkins jenkins 1.406
jenkins jenkins 1.407
jenkins jenkins 1.408
jenkins jenkins 1.409
jenkins jenkins 1.410
jenkins jenkins 1.411
jenkins jenkins 1.412
jenkins jenkins 1.413
jenkins jenkins 1.414
jenkins jenkins 1.415
jenkins jenkins 1.416
jenkins jenkins 1.417
jenkins jenkins 1.418
jenkins jenkins 1.419
jenkins jenkins 1.420
jenkins jenkins 1.421
jenkins jenkins 1.422
jenkins jenkins 1.423
jenkins jenkins 1.424
jenkins jenkins 1.425
jenkins jenkins 1.426
jenkins jenkins 1.427
jenkins jenkins 1.428
jenkins jenkins 1.429
jenkins jenkins 1.430
jenkins jenkins 1.431
jenkins jenkins 1.432
jenkins jenkins 1.433
jenkins jenkins 1.434
jenkins jenkins 1.435
jenkins jenkins 1.436
jenkins jenkins 1.437
cloudbees jenkins 1.466.1.2
cloudbees jenkins 1.466.2.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447.1.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "64DC99F9-DA01-4A7B-9AB6-8CCBEB1C0E54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447.2.2:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "894B96E5-3B3C-4D0E-8BED-5911A2AA2D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447.3.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "54BF2C2C-C920-41B7-A938-DA6CFADCEC3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.400:-:lts:*:*:*:*:*",
              "matchCriteriaId": "65C51F95-07E8-4F9F-B0D9-D5E5360F17F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424:-:lts:*:*:*:*:*",
              "matchCriteriaId": "E3A59F7E-1D1C-4E78-8CCC-4C05CBC6DE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447:-:lts:*:*:*:*:*",
              "matchCriteriaId": "830BA953-FE5C-457F-9CD5-8DAB70C54CC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06E9DD9A-E695-4F26-9790-D41D6C265CA7",
              "versionEndIncluding": "1.466.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.409.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEA024CA-1D9C-44B8-88B8-3663691B6EF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.409.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B759C60-B2D2-4C0C-89C2-6A089982C945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.409.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E73C86A-5AC5-4D9D-9F5C-BDF5F06C45B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F09B4E-DD5B-477C-9547-7C2D8039BCD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "744A5B4A-7B8E-40FE-9FE2-C935822FC65A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF148AFF-8AF1-43B8-B184-CAC0436F86AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CB21AA0-964A-4F69-8570-1742A5E6DA2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9517BF55-D76E-4A2B-A439-E43AC11B5C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0693E3B0-678C-4029-9A3F-64128D631571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.447.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F21028-9881-4669-B367-E9B35AC7601B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.447.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "59D9137C-C8DD-47A2-8D7F-318BAADA2A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.466.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC602437-C693-4555-A4DA-A061BAF3E2F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.0.2:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "4D47B599-AD9E-4CC7-99B0-5BBCE21FE12E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.0.4:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "1A64AD04-F3A7-493D-9092-D44203390ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.1.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "1008C47A-B18E-4888-A8D0-5E3BAE4406C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.2.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "9103E105-898E-49CB-AAEE-A01948678537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.4.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "46ACF9F0-E9B9-4BAC-A351-470E8B102737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.5.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "FDC2EC22-7A4F-492F-9723-386B238CAA88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.6.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "EF8269EF-2E74-4B21-ADFD-8AECD2383176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.6.11:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "713EEE59-CAE4-4E35-9E56-31BFB6311640",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3D692CD-0DD7-4777-AE59-13CB723BCC2D",
              "versionEndIncluding": "1.480.3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.400:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8F7CBDA-3667-4BC3-84DD-1544621A085B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.401:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82FC15F-E309-49D5-AE5D-9A7B2D14E87A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.402:*:*:*:*:*:*:*",
              "matchCriteriaId": "79096D36-805A-4A51-807D-D8ADD539E02E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.403:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C784E41-2F84-43DD-8CB5-BF351885248F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.404:*:*:*:*:*:*:*",
              "matchCriteriaId": "34A76EBB-2ECB-403F-B56D-C39E6119435E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.405:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D429FE3-D808-4625-BD44-703D2E87EE0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.406:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FE7E602-AD1A-4547-A3AC-C9F8B94EAF3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.407:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8B008A-76C7-495A-B8A6-25BA19E37C9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.408:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD609494-12EA-40AC-8EA7-30E9454BF533",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.409:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6CA4168-E3B3-42A1-90BC-66D6ADA1A847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.410:*:*:*:*:*:*:*",
              "matchCriteriaId": "1657F755-942D-4F6F-A55A-F0633BD14547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.411:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2231A9B-4E1F-4077-8B3F-C7FDAE73475D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.412:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF9A1C7-7C53-46BC-B433-34FE9A11C2C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.413:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA19A7DF-A800-4664-B799-1FCBA8D63788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.414:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1F843B-56CD-4A67-92C3-AC4957221D81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.415:*:*:*:*:*:*:*",
              "matchCriteriaId": "C53EC41A-13ED-432C-9240-FA429E85B1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.416:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DEF2C98-D4A5-4004-BD39-6400531FF7EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.417:*:*:*:*:*:*:*",
              "matchCriteriaId": "E357EACF-210E-433F-81F1-659A4F3352B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.418:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD8EE26-DB37-49FC-B8D6-7D56FA249D19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.419:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2808D7-72FD-4EB7-9459-21F611509305",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.420:*:*:*:*:*:*:*",
              "matchCriteriaId": "891AAB03-DA45-4AB3-B0F4-01FCD4E545C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.421:*:*:*:*:*:*:*",
              "matchCriteriaId": "D27D4E1B-82CC-490B-AF4D-52EAC7DF85CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.422:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B1C29A7-1226-4179-9275-20C98D649631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.423:*:*:*:*:*:*:*",
              "matchCriteriaId": "8924363E-3C74-4AE6-9CAB-74FF38E16457",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7DF595E-17B5-4DDF-A875-B650AA789F21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.425:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2F76FBA-5E35-4A3D-85E6-9778982B246D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.426:*:*:*:*:*:*:*",
              "matchCriteriaId": "E15232BB-090A-448C-BD50-92C97984CC96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F4A0247-3C79-4F78-A086-877B5C5E1252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.428:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAA375A6-68B4-49D0-BDD0-E7FB0276C9DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.429:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D44683-47F1-4E7A-8B63-F2932836CD3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.430:*:*:*:*:*:*:*",
              "matchCriteriaId": "0523F7C0-BCA4-4A75-BA83-0E0BEEED279A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.431:*:*:*:*:*:*:*",
              "matchCriteriaId": "A52383BB-66BF-4C87-9DA5-B278DD32CA66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "359CC43E-9ADC-4270-A015-0D1CD6D98B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.433:*:*:*:*:*:*:*",
              "matchCriteriaId": "2968A12D-7CAF-4D8B-8E88-28204EA284FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.434:*:*:*:*:*:*:*",
              "matchCriteriaId": "17E95B6C-05F4-46A0-B36F-7F6A52B848F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.435:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CAF85B-B825-4B7A-ACF9-A52E1E930592",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.436:*:*:*:*:*:*:*",
              "matchCriteriaId": "75416939-96FB-4970-AB14-4374F3B80504",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.437:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B78DF52-88A5-49A9-B705-16B42A9039C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.466.1.2:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "26046DC7-335B-4E29-86F3-A2077AD32AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.466.2.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "C5D05B3A-8709-4061-810E-656B6D5BDAED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Open redirect vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de redirecci\u00f3n abierta en Jenkins en versiones anteriores a 1.491, Jenkins LTS en versiones anteriores a 1.480.1 y Jenkins Enterprise 1.424.x en versiones anteriores a 1.424.6.13, 1.447.x en versiones anteriores a 1.447.4.1 y 1.466.x en versiones anteriores a 1.466.10.1 permite a atacantes remotos redirigir a los usuarios a sitios web arbitrarios y llevar a cabo ataques de phishing a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2012-6073",
  "lastModified": "2024-11-21T01:45:45.763",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-02-24T22:55:01.143",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/12/28/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890608"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/12/28/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890608"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.