fkie_cve-2012-6074
Vulnerability from fkie_nvd
Published
2013-02-24 22:55
Modified
2024-11-21 01:45
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote authenticated users with write access to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
cloudbees jenkins *
jenkins jenkins 1.400
jenkins jenkins 1.401
jenkins jenkins 1.402
jenkins jenkins 1.403
jenkins jenkins 1.404
jenkins jenkins 1.405
jenkins jenkins 1.406
jenkins jenkins 1.407
jenkins jenkins 1.408
jenkins jenkins 1.409
jenkins jenkins 1.410
jenkins jenkins 1.411
jenkins jenkins 1.412
jenkins jenkins 1.413
jenkins jenkins 1.414
jenkins jenkins 1.415
jenkins jenkins 1.416
jenkins jenkins 1.417
jenkins jenkins 1.418
jenkins jenkins 1.419
jenkins jenkins 1.420
jenkins jenkins 1.421
jenkins jenkins 1.422
jenkins jenkins 1.423
jenkins jenkins 1.424
jenkins jenkins 1.425
jenkins jenkins 1.426
jenkins jenkins 1.427
jenkins jenkins 1.428
jenkins jenkins 1.429
jenkins jenkins 1.430
jenkins jenkins 1.431
jenkins jenkins 1.432
jenkins jenkins 1.433
jenkins jenkins 1.434
jenkins jenkins 1.435
jenkins jenkins 1.436
jenkins jenkins 1.437
cloudbees jenkins 1.447.1.1
cloudbees jenkins 1.447.2.2
cloudbees jenkins 1.447.3.1
cloudbees jenkins 1.424.0.2
cloudbees jenkins 1.424.0.4
cloudbees jenkins 1.424.1.1
cloudbees jenkins 1.424.2.1
cloudbees jenkins 1.424.4.1
cloudbees jenkins 1.424.5.1
cloudbees jenkins 1.424.6.1
cloudbees jenkins 1.424.6.11
cloudbees jenkins 1.466.1.2
cloudbees jenkins 1.466.2.1
cloudbees jenkins 1.400
cloudbees jenkins 1.424
cloudbees jenkins 1.447
jenkins jenkins *
jenkins jenkins 1.409.1
jenkins jenkins 1.409.2
jenkins jenkins 1.409.3
jenkins jenkins 1.424.1
jenkins jenkins 1.424.2
jenkins jenkins 1.424.3
jenkins jenkins 1.424.4
jenkins jenkins 1.424.5
jenkins jenkins 1.424.6
jenkins jenkins 1.447.1
jenkins jenkins 1.447.2
jenkins jenkins 1.466.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3D692CD-0DD7-4777-AE59-13CB723BCC2D",
              "versionEndIncluding": "1.480.3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.400:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8F7CBDA-3667-4BC3-84DD-1544621A085B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.401:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82FC15F-E309-49D5-AE5D-9A7B2D14E87A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.402:*:*:*:*:*:*:*",
              "matchCriteriaId": "79096D36-805A-4A51-807D-D8ADD539E02E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.403:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C784E41-2F84-43DD-8CB5-BF351885248F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.404:*:*:*:*:*:*:*",
              "matchCriteriaId": "34A76EBB-2ECB-403F-B56D-C39E6119435E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.405:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D429FE3-D808-4625-BD44-703D2E87EE0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.406:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FE7E602-AD1A-4547-A3AC-C9F8B94EAF3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.407:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8B008A-76C7-495A-B8A6-25BA19E37C9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.408:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD609494-12EA-40AC-8EA7-30E9454BF533",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.409:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6CA4168-E3B3-42A1-90BC-66D6ADA1A847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.410:*:*:*:*:*:*:*",
              "matchCriteriaId": "1657F755-942D-4F6F-A55A-F0633BD14547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.411:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2231A9B-4E1F-4077-8B3F-C7FDAE73475D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.412:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF9A1C7-7C53-46BC-B433-34FE9A11C2C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.413:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA19A7DF-A800-4664-B799-1FCBA8D63788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.414:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1F843B-56CD-4A67-92C3-AC4957221D81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.415:*:*:*:*:*:*:*",
              "matchCriteriaId": "C53EC41A-13ED-432C-9240-FA429E85B1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.416:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DEF2C98-D4A5-4004-BD39-6400531FF7EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.417:*:*:*:*:*:*:*",
              "matchCriteriaId": "E357EACF-210E-433F-81F1-659A4F3352B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.418:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD8EE26-DB37-49FC-B8D6-7D56FA249D19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.419:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2808D7-72FD-4EB7-9459-21F611509305",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.420:*:*:*:*:*:*:*",
              "matchCriteriaId": "891AAB03-DA45-4AB3-B0F4-01FCD4E545C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.421:*:*:*:*:*:*:*",
              "matchCriteriaId": "D27D4E1B-82CC-490B-AF4D-52EAC7DF85CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.422:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B1C29A7-1226-4179-9275-20C98D649631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.423:*:*:*:*:*:*:*",
              "matchCriteriaId": "8924363E-3C74-4AE6-9CAB-74FF38E16457",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7DF595E-17B5-4DDF-A875-B650AA789F21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.425:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2F76FBA-5E35-4A3D-85E6-9778982B246D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.426:*:*:*:*:*:*:*",
              "matchCriteriaId": "E15232BB-090A-448C-BD50-92C97984CC96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F4A0247-3C79-4F78-A086-877B5C5E1252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.428:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAA375A6-68B4-49D0-BDD0-E7FB0276C9DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.429:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D44683-47F1-4E7A-8B63-F2932836CD3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.430:*:*:*:*:*:*:*",
              "matchCriteriaId": "0523F7C0-BCA4-4A75-BA83-0E0BEEED279A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.431:*:*:*:*:*:*:*",
              "matchCriteriaId": "A52383BB-66BF-4C87-9DA5-B278DD32CA66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "359CC43E-9ADC-4270-A015-0D1CD6D98B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.433:*:*:*:*:*:*:*",
              "matchCriteriaId": "2968A12D-7CAF-4D8B-8E88-28204EA284FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.434:*:*:*:*:*:*:*",
              "matchCriteriaId": "17E95B6C-05F4-46A0-B36F-7F6A52B848F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.435:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CAF85B-B825-4B7A-ACF9-A52E1E930592",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.436:*:*:*:*:*:*:*",
              "matchCriteriaId": "75416939-96FB-4970-AB14-4374F3B80504",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.437:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B78DF52-88A5-49A9-B705-16B42A9039C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447.1.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "64DC99F9-DA01-4A7B-9AB6-8CCBEB1C0E54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447.2.2:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "894B96E5-3B3C-4D0E-8BED-5911A2AA2D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447.3.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "54BF2C2C-C920-41B7-A938-DA6CFADCEC3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.0.2:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "4D47B599-AD9E-4CC7-99B0-5BBCE21FE12E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.0.4:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "1A64AD04-F3A7-493D-9092-D44203390ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.1.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "1008C47A-B18E-4888-A8D0-5E3BAE4406C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.2.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "9103E105-898E-49CB-AAEE-A01948678537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.4.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "46ACF9F0-E9B9-4BAC-A351-470E8B102737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.5.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "FDC2EC22-7A4F-492F-9723-386B238CAA88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.6.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "EF8269EF-2E74-4B21-ADFD-8AECD2383176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.6.11:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "713EEE59-CAE4-4E35-9E56-31BFB6311640",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.466.1.2:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "26046DC7-335B-4E29-86F3-A2077AD32AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.466.2.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "C5D05B3A-8709-4061-810E-656B6D5BDAED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.400:-:lts:*:*:*:*:*",
              "matchCriteriaId": "65C51F95-07E8-4F9F-B0D9-D5E5360F17F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424:-:lts:*:*:*:*:*",
              "matchCriteriaId": "E3A59F7E-1D1C-4E78-8CCC-4C05CBC6DE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447:-:lts:*:*:*:*:*",
              "matchCriteriaId": "830BA953-FE5C-457F-9CD5-8DAB70C54CC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06E9DD9A-E695-4F26-9790-D41D6C265CA7",
              "versionEndIncluding": "1.466.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.409.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEA024CA-1D9C-44B8-88B8-3663691B6EF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.409.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B759C60-B2D2-4C0C-89C2-6A089982C945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.409.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E73C86A-5AC5-4D9D-9F5C-BDF5F06C45B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F09B4E-DD5B-477C-9547-7C2D8039BCD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "744A5B4A-7B8E-40FE-9FE2-C935822FC65A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF148AFF-8AF1-43B8-B184-CAC0436F86AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CB21AA0-964A-4F69-8570-1742A5E6DA2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9517BF55-D76E-4A2B-A439-E43AC11B5C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0693E3B0-678C-4029-9A3F-64128D631571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.447.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F21028-9881-4669-B367-E9B35AC7601B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.447.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "59D9137C-C8DD-47A2-8D7F-318BAADA2A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.466.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC602437-C693-4555-A4DA-A061BAF3E2F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote authenticated users with write access to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de XSS en Jenkins en versiones anteriores a 1.491, Jenkins LTS en versiones anteriores a 1.480.1 y Jenkins Enterprise 1.424.x en versiones anteriores a 1.424.6.13, 1.447.x en versiones anteriores a 1.447.4.1 y 1.466.x en versiones anteriores a 1.466.10.1 permite a usuarios remotos autenticados con acceso de escritura inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2012-6074",
  "lastModified": "2024-11-21T01:45:45.893",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-02-24T22:55:01.207",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/12/28/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890612"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/12/28/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.