fkie_cve-2012-6139
Vulnerability from fkie_nvd
Published
2013-04-12 22:55
Modified
2024-11-21 01:45
Severity ?
Summary
libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45AC51B-B71D-4F32-845F-8CADEDF658CE", "versionEndIncluding": "1.1.27", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E595672-2421-461D-87D9-328048B25050", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "956B09D6-C565-400E-A138-ED4A2BBC275E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "6AD95682-DC9E-4F6F-AFAF-A76A5798CD6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "28E01474-EC8B-4664-8207-EC46C0175554", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5175CD5-1CA4-49A8-8CCD-586EFCD25D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0AB058A-BAF1-4F86-9F79-8C5A9A01DC0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1975FB9-2D07-418B-BB0B-782D068C0535", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "D10EDFCC-7A5B-4AE4-A213-494711975D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF2B4C26-6197-4C37-AABB-934EF4E37943", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFA1BBF-D793-4E1C-82A5-4688675B542F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D71D19E-2679-42A1-81E4-CE1DE422CE7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7AD4CCA-3D5F-410F-A4C0-8722CE656E68", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C0DDE39-304C-4F1B-B840-1CF3C970D3BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "2FE5C85D-4044-413B-863A-25972FC6F669", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C4F412D-4DC9-4F36-9035-78F5977D0FCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "99186C70-8E36-45F9-8E42-4A08D2FDEF2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "03E48915-76B4-4788-B4AA-6B3B7746E397", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFC5C699-6CDB-4C2C-8BD7-1F68AB0C5348", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E3DB742-5752-408A-AD89-55032A2389B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "1A57E80C-5D45-4574-9944-AC0DA3620118", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "5CB7BA1B-9548-4D1C-8A10-34239120B0BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "86D10EDB-D8DF-4CA3-8799-D2646DEC802B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "2B4EA931-6846-488F-AD33-FE9D04EF07A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "9D67FD41-2404-4658-8D6B-4DBD4F471880", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2A6F6DF1-2375-4389-B07D-FF486C3502CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "0469B71F-2303-4072-9C54-2004A117E4C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "1BDFD037-100A-4F3E-B114-E3F72BA17084", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "F2EDDE79-10ED-4465-ADEA-C989548BA314", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "C61F9034-C7F6-4430-A2AA-4A0C00A9747B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "68926A2D-5311-46CF-AF16-AC16F53CDE45", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "B3CBA3E7-0BD1-41B2-BC17-D26BA825B983", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "E63AAA8C-84CB-40D9-85D3-B8E62B6304CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "8C19E3F3-2B60-4356-B32A-64F39340FB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "34C904FE-A924-47B3-87DA-4F5A0BF1A398", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "AEE3321C-0865-4734-BB89-C3C4AAABBA61", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "684B2370-5265-4E85-BAE0-A987FA14F6DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "46F05C32-8B19-4B6A-A02F-D5F96489979E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "A83D4930-CA0C-4BE0-BA05-A041F80AA6A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "F824E314-F658-463F-9A33-AA577EF8D4E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "C0556BEA-0B5E-4EF7-9E7E-EF0A4323BFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "4C09DB64-1D4B-4047-B76A-D249B8D0F55F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "270B7D3F-2541-4E7C-B40C-2014BD3CA4DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "29159B77-EB1C-4DA3-9DD5-52113C353870", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "9D2878F7-0917-4A17-9CB3-3B644A9B8A26", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "E43B3CAF-65FA-417C-A8E5-04806C4C3709", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "26F9E2A6-19FC-41D4-9EB7-4FFCB152CDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "8699DD77-22BD-4E8F-8210-956E7DCD805D", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "FF265313-EB0B-4649-A432-E95DE0AEE4EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "555054F5-4C4C-4BD0-ADD9-2E8C55814D9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "14054A80-5975-48DA-A2B8-800ED3F17F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E39216FB-6A55-4C15-AEBA-AC68CFE8D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B8F9F47F-76D2-44F7-93DE-045E5F05DF57", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "BBF5779A-EE67-4AA2-86EE-5F4534AF8EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "04167292-B8A5-4CE2-AE7B-70FD2BDE5724", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "3A663FD5-6694-4203-A0B8-405121A6B346", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1614DAE5-A84E-4898-B9E0-E4F5DD5D17AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "493B79B8-74A0-4089-BBA5-435C3B549928", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "CBFCEA36-7573-491B-8438-4E3FDF8E97ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "EF38997D-634C-423C-BD82-44E74A99D8DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A9B4CF5A-150E-4814-BA15-EF9FB30AD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9D4401FF-84D8-4AD5-BAED-978E31E5DADB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "CC004874-3C5D-4932-AD5B-BE7156D7D13E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "269892E0-1ABA-4D0F-8266-A4DA8A575967", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "4597D362-AD62-4D58-BC7F-CCED44488466", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "0D885D06-D6E5-432C-9923-AE2CE73F7654", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F5003EF-82E2-49F9-9F74-CB92FE98E2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D6095-2A7B-4328-ADA0-283E8F79AFDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "91C70E5E-A987-4BF3-9300-E4A3F2B0B853", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "C5EFA6E9-593B-484A-A8FB-A22BAEE208B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "6C55B5B1-76F1-480B-B7F9-EF4AFE79E3F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "58E904DA-889E-44B9-9AF6-EC753FB316BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "A3BC6F57-1DDD-4EA6-83F9-2672B11DF7B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "69A51C1E-21C9-4FA4-8340-345B5E1F1B70", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "C9D7C38F-EF88-4531-803D-BA911978A176", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "FCE8B7B5-4C35-4F65-B891-80A207BA83D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "147804D0-9C1A-4BD8-A800-0F2B7EA40FEA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c." }, { "lang": "es", "value": "libxslt antes de v1.1.28 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (desreferencia a puntero NULL y ca\u00edda del sistema) mediante un atributo (1) match vac\u00edo en una clave XSL a la funci\u00f3n xsltAddKey en keys.c o (2) una variable no inicializada en la funci\u00f3n xsltDocumentFunction en functions.c." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n\u0027CWE-476: NULL Pointer Dereference\u0027", "id": "CVE-2012-6139", "lastModified": "2024-11-21T01:45:53.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-12T22:55:01.007", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102065.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52745" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52805" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52813" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52884" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2654" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:141" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1028338" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1784-1" }, { "source": "secalert@redhat.com", "url": "http://xmlsoft.org/XSLT/news.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.gnome.org/show_bug.cgi?id=685328" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.gnome.org/show_bug.cgi?id=685330" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8d" }, { "source": "secalert@redhat.com", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107" }, { "source": "secalert@redhat.com", "url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html" }, { "source": "secalert@redhat.com", "url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102065.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52745" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52805" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52884" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2654" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:141" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1028338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1784-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://xmlsoft.org/XSLT/news.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.gnome.org/show_bug.cgi?id=685328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.gnome.org/show_bug.cgi?id=685330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.