Search criteria

24 vulnerabilities found for namazu by namazu

FKIE_CVE-2011-4711

Vulnerability from fkie_nvd - Published: 2011-12-08 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple directory traversal vulnerabilities in namazu.cgi in Namazu before 2.0.16 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) lang or (2) result parameter.
Impacted products
Vendor Product Version
namazu namazu *
namazu namazu 0.1.0
namazu namazu 0.1.1
namazu namazu 0.1.2
namazu namazu 0.1.3
namazu namazu 0.1.4
namazu namazu 0.2.0
namazu namazu 0.2.1
namazu namazu 0.2.2
namazu namazu 0.3.0
namazu namazu 0.3.1
namazu namazu 0.3.2
namazu namazu 0.3.3
namazu namazu 1.0.0
namazu namazu 1.0.1
namazu namazu 1.0.2
namazu namazu 1.0.3
namazu namazu 1.0.4
namazu namazu 1.0.4a
namazu namazu 1.0.4b
namazu namazu 1.1.0
namazu namazu 1.1.0a
namazu namazu 1.1.1
namazu namazu 1.1.1.1
namazu namazu 1.1.1.2
namazu namazu 1.1.1.3
namazu namazu 1.1.1.4
namazu namazu 1.1.1.5
namazu namazu 1.1.2
namazu namazu 1.1.2.1
namazu namazu 1.1.2.2
namazu namazu 1.1.2.3
namazu namazu 1.1.2.4
namazu namazu 1.1.2.5
namazu namazu 1.2.0
namazu namazu 1.2.0.1
namazu namazu 1.2.0.2
namazu namazu 1.2.0.3
namazu namazu 1.2.0.4
namazu namazu 1.2.0.5
namazu namazu 1.2.1.0
namazu namazu 1.2.1.0
namazu namazu 1.2.1.0
namazu namazu 1.2.1.0
namazu namazu 1.2.1.0
namazu namazu 1.2.1.0
namazu namazu 1.2.1.0
namazu namazu 1.2.1.0
namazu namazu 1.2.1.0
namazu namazu 1.3.0.0
namazu namazu 1.3.0.0
namazu namazu 1.3.0.0
namazu namazu 1.3.0.0
namazu namazu 1.3.0.0
namazu namazu 1.3.0.0
namazu namazu 1.3.0.0
namazu namazu 1.3.0.0
namazu namazu 1.3.0.0
namazu namazu 1.3.0.0
namazu namazu 1.3.0.0
namazu namazu 1.3.0.0
namazu namazu 1.3.0.0
namazu namazu 1.3.0.0
namazu namazu 1.3.0.1
namazu namazu 1.3.0.1
namazu namazu 1.3.0.2
namazu namazu 1.3.1.0
namazu namazu 1.3.1.0
namazu namazu 1.3.1.0
namazu namazu 1.3.1.0
namazu namazu 1.3.1.0
namazu namazu 1.3.1.0
namazu namazu 1.3.1.0
namazu namazu 1.3.1.0
namazu namazu 1.3.1.0
namazu namazu 1.3.1.0
namazu namazu 1.3.1.0
namazu namazu 1.4.0.0
namazu namazu 1.4.0.0
namazu namazu 1.4.0.0
namazu namazu 1.4.0.0
namazu namazu 1.4.0.0
namazu namazu 1.4.0.0
namazu namazu 1.4.0.0
namazu namazu 1.4.0.0
namazu namazu 1.4.0.0
namazu namazu 1.4.0.0
namazu namazu 1.4.0.0
namazu namazu 1.4.0.0
namazu namazu 1.4.0.0
namazu namazu 1.4.0.0
namazu namazu 1.4.0.0
namazu namazu 2.0
namazu namazu 2.0.1
namazu namazu 2.0.2
namazu namazu 2.0.3
namazu namazu 2.0.4
namazu namazu 2.0.5
namazu namazu 2.0.6
namazu namazu 2.0.6
namazu namazu 2.0.6
namazu namazu 2.0.6
namazu namazu 2.0.6
namazu namazu 2.0.6
namazu namazu 2.0.6
namazu namazu 2.0.6
namazu namazu 2.0.6
namazu namazu 2.0.6
namazu namazu 2.0.6
namazu namazu 2.0.7
namazu namazu 2.0.7
namazu namazu 2.0.7
namazu namazu 2.0.7
namazu namazu 2.0.8
namazu namazu 2.0.8
namazu namazu 2.0.9
namazu namazu 2.0.9
namazu namazu 2.0.10
namazu namazu 2.0.10
namazu namazu 2.0.10
namazu namazu 2.0.11
namazu namazu 2.0.11
namazu namazu 2.0.11
namazu namazu 2.0.11
namazu namazu 2.0.11
namazu namazu 2.0.12
namazu namazu 2.0.13
namazu namazu 2.0.13
namazu namazu 2.0.13
namazu namazu 2.0.13
namazu namazu 2.0.13
namazu namazu 2.0.13
namazu namazu 2.0.13
namazu namazu 2.0.13
namazu namazu 2.0.13
namazu namazu 2.0.13
namazu namazu 2.0.13
namazu namazu 2.0.15
namazu namazu 2.0.15
namazu namazu 2.0.15
namazu namazu 2.0.15
namazu namazu 2.0.15
namazu namazu 2.0.15
namazu namazu 2.0.15
namazu namazu 2.0.15
namazu namazu 2.0.15
namazu namazu 2.0.15
namazu namazu 2.0.16

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:namazu:namazu:*:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "647040BF-8800-406B-870A-3FA2AF972E54",
              "versionEndIncluding": "2.0.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:0.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED6AA51-FAF2-462F-8C7D-4BC7138C552D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:0.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "75571060-1953-4C8F-83A0-804618CB101A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:0.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F99DF35-76D9-49F6-A69F-0A7C23163146",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:0.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D71EFDED-EBAB-43B3-A8B3-BD0C36D33470",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:0.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F3040D0-809A-47C6-BA23-5B29FB1E19F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:0.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CCCDF60-6F98-4753-B3F0-FA73BE089462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:0.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EDE590-3BA5-4930-8733-0CE3A8DE84CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:0.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A51A084F-E73B-4339-9D07-74ED21991755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:0.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB24B37-8C3B-4351-BBF7-DBCDAB8D4CD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4B0902F-BF0B-4CA2-A5DD-9DCCBFD3ACBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A118BAB-B300-4442-9790-CEDC1F22A04C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD58F5BF-B770-430D-9440-22FDCC3B7C6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54583C9C-480A-4024-803F-DAE339CD6ED4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D29749-1E41-4C6A-AE91-E24419832A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F56924D-049D-4BE1-8CE8-8FB43D6F0EFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3941646A-CC93-4318-A892-4CDD0CCCDE59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D61E65F-BC0C-4DF1-8B6A-FF8B83D58E49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.0.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7977CFD-BE97-4347-9AD5-8A5DA41FE9D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.0.4b:*:*:*:*:*:*:*",
              "matchCriteriaId": "B41DC8AE-4D32-456A-8800-C6B68DCEF41B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF9D1A68-9980-4259-80F3-AE66F0046028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4ABD1BC-BB87-44D9-9297-9F3B08C0998A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA26197-2BF7-4F2A-B8B7-3029E14E649E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "417C4C57-EC28-4454-AF4E-BC9BD1BCC3BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E392EC-B137-4146-AA4C-B0B6239D129D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E89D545-F9A0-4FA4-9C2E-602F6C27AC19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1541C341-F25C-4299-B6B3-A6604D877512",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20F3AF09-AE3A-4BB4-A815-EA873926C11C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34127CEC-68C4-4339-96AA-F88764E42916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EFE49F2-820F-49F4-891B-05FD874E2EF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DDEB067-EFE8-4B3E-83C7-7AFE44A1210B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A8C4014-553D-43B9-81A3-8C461CD282F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "84D13743-91B5-46B2-8E29-77E1C5B4AEC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "48C510B7-C653-47BC-890B-23D19DA57948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3169073-F2D2-42E7-A54A-6A576CB26FC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAD5F6C2-B112-46A4-9519-57D3063C60A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0454EB1A-F893-4A19-A782-A50BFEB0D10E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "68F32FE9-0929-42BF-839B-95755C599A10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EB488A-475D-443D-AD1C-D933FE5450F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.0.5:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "D8EFDF9F-2696-49B6-8BE3-17AC91FB8FB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.1.0:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "BC76135E-22F3-4BE4-8018-20ADB47E8716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.1.0:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "E8FB7F11-6C58-4841-876B-CF81E10388FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.1.0:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "00E7E029-C623-4EC6-AD3A-81D39E7148CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.1.0:beta13:*:*:*:*:*:*",
              "matchCriteriaId": "68AAAE67-6C4D-4F67-BC52-370A3C5DD1F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.1.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "93C53A17-1A82-41BF-B3DA-7E683C3C3145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.1.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "33ECA260-54B9-41CC-A930-C0E5B4FD1E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.1.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "0D9C7A66-C7CB-44CF-A77E-E1646FF225F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.1.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "F837573C-5A04-4B45-A1F7-D5913D482578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.2.1.0:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "3B94F15C-63A6-4751-8ADD-50E032BCA8A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9255B365-7271-4D25-AAEA-3BF85324BFD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "D0688B5C-EC2D-452B-8911-E84FAC131963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.0:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "D022F695-727E-4CF9-BFE4-801D12C90FA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.0:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "639D8490-46A9-4BD8-90C1-2B7B4D9144C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.0:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "6A2E4079-F036-4F6A-AB4C-37F2B3EBCF76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.0:beta13:*:*:*:*:*:*",
              "matchCriteriaId": "4C386377-286E-4539-B1F1-37CE267D109C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "1AF30437-19F6-420C-9DEC-AC6D422A78AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "1C5C79E4-C1C9-458F-B321-8977B2AD7507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B8F92354-4323-4986-9DBA-FF0148CB2426",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "E79C5C51-35D6-4453-B60B-BDBD142A1B45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "6E6CA0EC-B8AD-4E60-AD79-9B689D7249C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "E9EE4A36-0B53-4BAA-842F-CBC26BB9224E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "A71EAF55-962F-4A64-BD5F-133F2758001E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.0:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "7E3B5823-9C2A-47AF-AECE-F2B0411FEDB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "60ADCB9F-C1E6-4364-A2C2-5DECF6D71EE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.1:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E52FE67-FD0E-4A39-9102-8CA4D05E054B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5E3076B-BF75-4781-9C72-93B49CEC0439",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.1.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "4C77A20A-756E-4A11-9193-452B5547B69A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.1.0:alpha10:*:*:*:*:*:*",
              "matchCriteriaId": "54EEBEEE-94C0-4E2B-9D58-427F5FB62FAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.1.0:alpha11:*:*:*:*:*:*",
              "matchCriteriaId": "D16BC6EC-0161-4D83-83D5-65FA505E4339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.1.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "C36AA4D5-0427-4A6D-BFC4-E5E68CBB02D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.1.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "B627CB30-F161-474E-AC66-1E8DD133356F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.1.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "522F4743-636D-40E7-AFF9-034E68FBA74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.1.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "19489F29-F621-45FF-8810-54F2413C05C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.1.0:alpha6:*:*:*:*:*:*",
              "matchCriteriaId": "95676E74-A204-4FD1-B5A5-87F9DF9B6E42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.1.0:alpha7:*:*:*:*:*:*",
              "matchCriteriaId": "D5B4F1EF-2223-4606-B9D4-B8ADFBF05639",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.1.0:alpha8:*:*:*:*:*:*",
              "matchCriteriaId": "240351EC-3746-4C54-883F-4D21FCAC5A57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.1.0:alpha9:*:*:*:*:*:*",
              "matchCriteriaId": "C4E98888-8ABC-42C7-BE63-659E0354537E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "5E006BEC-AACC-41AB-8104-254F82AFEF9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "33FC9475-5F83-4790-876E-BE88079AF3F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "9C9C23AB-D29E-479B-B86A-86137360C8F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "DC127763-919D-43C4-B4AC-B10E4F01589D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "272B3D4E-E195-45C9-8734-8B0F610AE70D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:alpha6:*:*:*:*:*:*",
              "matchCriteriaId": "EC4A2FAF-085F-49B7-9BEC-6415E6FE6664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:alpha7:*:*:*:*:*:*",
              "matchCriteriaId": "D406BABF-2507-4D82-9606-0DF0C14D2C8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "79C27BE4-317C-4475-84DE-E53D0D8FBBAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "F81A55FB-7449-43D4-B76C-14B34F06C25C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "1CBB07DF-E579-452E-94C6-F4B38BDAD327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "5E1C7A14-88A1-44CE-A1C9-A02D8DA9E388",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "B045FAD4-11AF-4ED8-A99F-022247DCEFED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "98C1182D-17B4-4A9C-91FE-6DE55C7E975F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "8172FBA0-3C33-45F3-B688-73918AC280D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.4.0.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "EF12E60A-45F7-4F0C-BB47-72460F4AEAA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E9E6345-F6AF-4AC4-B9A5-54EDAB3E49CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E1A065-5E2B-42B0-813F-F1A750099BF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17EB317-5BCF-4756-8F1E-FD3303BBC662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD212F26-EB20-45BC-BF9D-AB5B5FCF72FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC21E6A1-B191-415C-8E6C-03DF9ED40323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4BAB0EA-8AB0-413D-B039-7C5D59C33B70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F986C7F-6FC5-4420-B56B-DEAF39F74B20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.6:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "828FB8F9-6A58-42E3-8806-1A2923C5039D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.6:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "B3F03670-7A88-456A-86F7-5B56AC6D75A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.6:pre3:*:*:*:*:*:*",
              "matchCriteriaId": "110C3AC4-8063-4303-8B29-D5BD3639E727",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "BF297FF5-4D06-46E6-A394-3F497B2D0C4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "DEE982F4-4C18-4665-B14A-528728E26D96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.6:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "6C1FA5C0-18E0-4B69-9964-7DCA62045CC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.6:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "3616525D-3D21-4B02-964E-23A0F36E0A87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.6:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "6368A560-9837-425A-8999-E17E474F6855",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.6:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "80E4D352-3CA3-4954-BFED-BF7F534B0279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.6:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "085D4514-0EDD-4A7F-9150-4D8B6187F98D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEE8D199-8F49-478E-B5A7-4901F11446FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.7:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "62CAA242-D414-4B36-B920-95153E8513F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.7:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "37D5F95A-D44B-4719-9B7A-8AD9BB9F7C6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.7:pre3:*:*:*:*:*:*",
              "matchCriteriaId": "4AC0D8BD-6F6C-4F1E-B0A9-76ED623665D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "694F5F25-3A11-47C8-9007-B9E6BEFAC0ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.8:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "6F53ADBF-0064-49C6-AAA5-C3D67D288C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "68E61791-8FFC-4352-9239-E9385F295688",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "8D3B4FCB-5BFE-424C-9499-4549FC571BC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F327931-C7FE-41B4-8D2C-27B1D8B8C6F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DD0C7C25-479C-42EE-A462-E9ADE97EFF17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4BEA3E27-ADF8-41E3-8E32-F7B05C90DDA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "429D214D-1833-4B93-A496-BFCEF996987E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.11:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "8B124E14-2F62-466B-83DF-DD9FAEC030F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.11:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "1C66D997-1C5C-4245-AAFB-391A76A21E72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.11:pre3:*:*:*:*:*:*",
              "matchCriteriaId": "56C58C12-1172-4330-BBA8-AE9923308E7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.11:pre4:*:*:*:*:*:*",
              "matchCriteriaId": "43B6ED25-B499-405D-BCA5-2C2B8940C135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C4F1F4-53D0-4EE4-8F6C-171E9B43A942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB42D2-C51A-4C2B-97DC-308246D7D853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:pre3:*:*:*:*:*:*",
              "matchCriteriaId": "ACD71903-ABF4-4B6E-B8D2-5E4A470018B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:pre4:*:*:*:*:*:*",
              "matchCriteriaId": "9B189415-ECC5-4D65-9B35-8E1F021765A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:pre5:*:*:*:*:*:*",
              "matchCriteriaId": "E8E1665D-861E-4222-AE2B-B6A0BB640E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:pre6:*:*:*:*:*:*",
              "matchCriteriaId": "39C1262E-398E-4665-9BA9-773F015F9E42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:pre7:*:*:*:*:*:*",
              "matchCriteriaId": "C3B9F413-0083-4BFB-9B58-5A9100B50C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:pre8:*:*:*:*:*:*",
              "matchCriteriaId": "6E8B3AE7-5C21-4039-875B-1729461AC4C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0A177F30-0DDC-4F20-827D-50597880BA1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FA5D24E0-2009-47A7-A3FB-F1F8AA51BACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "22106008-3B79-4A7F-A9B8-10A02D6C471B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "3015B051-6C82-4ED3-986F-C0E8857ED15B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FB99CD9-3892-4F06-AE5A-66741CE8201F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.15:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "6D28CA51-03D6-4B0F-8ABE-056CD79622C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.15:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "903F925B-D6B3-43F4-B57E-40D718038B20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.15:pre3:*:*:*:*:*:*",
              "matchCriteriaId": "5B44DFDC-4D3F-4F03-8D70-E7C7DDEC2921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.15:pre4:*:*:*:*:*:*",
              "matchCriteriaId": "2A8EB959-1522-4EE3-B350-864CA8BFB3B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A25B292C-8476-4395-ADE8-EFBE01B5B0B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.15:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17A338BB-ACBC-4F63-A44A-83E3758370B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.15:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "36D71068-D159-4231-A6FE-FD38D22F6D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.15:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "2D7B6E95-933A-4254-9AB1-876A37D6D6E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.15:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "78847126-2207-4B1D-B395-36F81AEEF468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.16:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17E25825-9873-44F7-AA8C-F3B2C621472A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple directory traversal vulnerabilities in namazu.cgi in Namazu before 2.0.16 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) lang or (2) result parameter."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de salto de directorio en namazu.cgi en Namazu antes de v2.0.16 permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de ..(punto punto) en el par\u00e1metro (1) lang o (2) result"
    }
  ],
  "id": "CVE-2011-4711",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-12-08T19:55:05.890",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.namazu.org/security.html#"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71489"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.namazu.org/security.html#"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71489"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-4345

Vulnerability from fkie_nvd - Published: 2011-11-30 04:05 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Namazu before 2.0.21, when Internet Explorer 6 or 7 is used, allows remote attackers to inject arbitrary web script or HTML via a cookie.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:namazu:namazu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DABD090-5AD7-4C71-915A-E5380FA9BC87",
              "versionEndIncluding": "2.0.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E9E6345-F6AF-4AC4-B9A5-54EDAB3E49CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17EB317-5BCF-4756-8F1E-FD3303BBC662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C4F1F4-53D0-4EE4-8F6C-171E9B43A942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB42D2-C51A-4C2B-97DC-308246D7D853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E70426F-C511-4582-BF05-448CCFB52607",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FB99CD9-3892-4F06-AE5A-66741CE8201F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC5AC101-DF8C-4517-9F46-64E4201D2D9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CD2D7C9-9A19-4122-B2EF-EF7F53AC58C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "C77F8A22-1EF7-4C39-B220-0E459EB7E9C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "33892F22-3F37-4D0A-8108-215397470880",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
              "matchCriteriaId": "693D3C1C-E3E4-49DB-9A13-44ADDFF82507",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A33FA7F-BB2A-4C66-B608-72997A2BD1DB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Namazu before 2.0.21, when Internet Explorer 6 or 7 is used, allows remote attackers to inject arbitrary web script or HTML via a cookie."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados XSS en Namazu antes de v2.0.21, cuando se usa Internet Explorer 6 o 7, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de una cookie."
    }
  ],
  "id": "CVE-2011-4345",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-11-30T04:05:58.717",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46925"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.namazu.org/security.html#cross-site-scripting"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/50771"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756348"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46925"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.namazu.org/security.html#cross-site-scripting"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/50771"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756348"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-5028

Vulnerability from fkie_nvd - Published: 2011-11-30 04:05 - Updated: 2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in Namazu before 2.0.20 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted request containing an empty uri field.
References
secalert@redhat.comhttp://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.59.8.28&r2=1.59.8.29&sortby=logPatch
secalert@redhat.comhttp://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.77.2.8&r2=1.77.2.9&sortby=logPatch
secalert@redhat.comhttp://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.86&r2=1.87&sortby=logPatch
secalert@redhat.comhttp://www.namazu.org/security.html
secalert@redhat.comhttp://www.securityfocus.com/bid/50772
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=756341Patch
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
af854a3a-2127-422b-91ae-364da2661108http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.59.8.28&r2=1.59.8.29&sortby=logPatch
af854a3a-2127-422b-91ae-364da2661108http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.77.2.8&r2=1.77.2.9&sortby=logPatch
af854a3a-2127-422b-91ae-364da2661108http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.86&r2=1.87&sortby=logPatch
af854a3a-2127-422b-91ae-364da2661108http://www.namazu.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/50772
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=756341Patch
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
Impacted products
Vendor Product Version
namazu namazu *
namazu namazu 2.0
namazu namazu 2.0.2
namazu namazu 2.0.12
namazu namazu 2.0.13
namazu namazu 2.0.14
namazu namazu 2.0.15
namazu namazu 2.0.16
namazu namazu 2.0.17
namazu namazu 2.0.18

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:namazu:namazu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFC363B-2848-4DB3-9C1C-BCB4D595B8E8",
              "versionEndIncluding": "2.0.19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E9E6345-F6AF-4AC4-B9A5-54EDAB3E49CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17EB317-5BCF-4756-8F1E-FD3303BBC662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C4F1F4-53D0-4EE4-8F6C-171E9B43A942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB42D2-C51A-4C2B-97DC-308246D7D853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E70426F-C511-4582-BF05-448CCFB52607",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FB99CD9-3892-4F06-AE5A-66741CE8201F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC5AC101-DF8C-4517-9F46-64E4201D2D9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CD2D7C9-9A19-4122-B2EF-EF7F53AC58C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "C77F8A22-1EF7-4C39-B220-0E459EB7E9C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in Namazu before 2.0.20 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted request containing an empty uri field."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en la pila en Namazu anterior a v2.0.20 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de peticiones manipuladas que contiene un campo de la URI vac\u00edo."
    }
  ],
  "id": "CVE-2009-5028",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-11-30T04:05:58.327",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.59.8.28\u0026r2=1.59.8.29\u0026sortby=log"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.77.2.8\u0026r2=1.77.2.9\u0026sortby=log"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.86\u0026r2=1.87\u0026sortby=log"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.namazu.org/security.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/50772"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756341"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.59.8.28\u0026r2=1.59.8.29\u0026sortby=log"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.77.2.8\u0026r2=1.77.2.9\u0026sortby=log"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.86\u0026r2=1.87\u0026sortby=log"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.namazu.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/50772"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756341"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-1468

Vulnerability from fkie_nvd - Published: 2008-03-24 21:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in namazu.cgi in Namazu before 2.0.18 allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded input, related to failure to set the charset, a different vector than CVE-2004-1318 and CVE-2001-1350. NOTE: some of these details are obtained from third party information.
References
cve@mitre.orghttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444
cve@mitre.orghttp://jvn.jp/jp/JVN%2300892830/index.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
cve@mitre.orghttp://marc.info/?l=bugtraq&m=127239985506823&w=2
cve@mitre.orghttp://secunia.com/advisories/29386Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29561
cve@mitre.orghttp://secunia.com/advisories/31687
cve@mitre.orghttp://secunia.com/advisories/39645
cve@mitre.orghttp://www.namazu.org/security.html.en
cve@mitre.orghttp://www.securityfocus.com/bid/28380
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41360
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00575.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00654.html
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444
af854a3a-2127-422b-91ae-364da2661108http://jvn.jp/jp/JVN%2300892830/index.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=127239985506823&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29386Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29561
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31687
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39645
af854a3a-2127-422b-91ae-364da2661108http://www.namazu.org/security.html.en
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28380
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41360
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00575.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00654.html
Impacted products
Vendor Product Version
namazu namazu *
namazu namazu 1.3.0.11
namazu namazu 2.0
namazu namazu 2.0.2
namazu namazu 2.0.12
namazu namazu 2.0.13
namazu namazu 2.0.14
namazu namazu 2.0.15
namazu namazu 2.0.16

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:namazu:namazu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7652498D-C86D-4457-AE11-99CD320DFCDA",
              "versionEndIncluding": "2.0.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:1.3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAE7466-56A5-4FBF-8F28-F33150FA2713",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E9E6345-F6AF-4AC4-B9A5-54EDAB3E49CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17EB317-5BCF-4756-8F1E-FD3303BBC662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C4F1F4-53D0-4EE4-8F6C-171E9B43A942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB42D2-C51A-4C2B-97DC-308246D7D853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E70426F-C511-4582-BF05-448CCFB52607",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FB99CD9-3892-4F06-AE5A-66741CE8201F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC5AC101-DF8C-4517-9F46-64E4201D2D9F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in namazu.cgi in Namazu before 2.0.18 allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded input, related to failure to set the charset, a different vector than CVE-2004-1318 and CVE-2001-1350. NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en namazu.cgi de Namazu antes de 2.0.18 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de una entrada codificada con UTF-7, relacionada con un fallo al establecer el conjunto de caracteres, un vector distinto a CVE-2004-1318 y CVE-2001-1350. NOTA: alguno de estos detalles se han obtenido de informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2008-1468",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-03-24T21:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/jp/JVN%2300892830/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=127239985506823\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29386"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29561"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31687"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/39645"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.namazu.org/security.html.en"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28380"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41360"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00575.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00654.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/jp/JVN%2300892830/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=127239985506823\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29386"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29561"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39645"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.namazu.org/security.html.en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28380"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41360"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00575.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00654.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2004-1318

Vulnerability from fkie_nvd - Published: 2005-01-06 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in namazu.cgi for Namazu 2.0.13 and earlier allows remote attackers to inject arbitrary HTML and web script via a query that starts with a tab ("%09") character, which prevents the rest of the query from being properly sanitized.
References
cve@mitre.orghttp://jvn.jp/jp/JVN%23904429FE.htmlVendor Advisory
cve@mitre.orghttp://secunia.com/advisories/13600
cve@mitre.orghttp://securitytracker.com/alerts/2005/Jan/1012802.html
cve@mitre.orghttp://securitytracker.com/alerts/2005/Jan/1012805.html
cve@mitre.orghttp://www.debian.org/security/2005/dsa-627Vendor Advisory
cve@mitre.orghttp://www.linuxsecurity.com/content/view/117604/102/
cve@mitre.orghttp://www.namazu.org/security.html.en#xss-tabPatch, Vendor Advisory
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_01_sr.html
cve@mitre.orghttp://www.osvdb.org/12516
cve@mitre.orghttp://www.securityfocus.com/advisories/9028
cve@mitre.orghttp://www.securityfocus.com/bid/12053
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18623
af854a3a-2127-422b-91ae-364da2661108http://jvn.jp/jp/JVN%23904429FE.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/13600
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/alerts/2005/Jan/1012802.html
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/alerts/2005/Jan/1012805.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-627Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.linuxsecurity.com/content/view/117604/102/
af854a3a-2127-422b-91ae-364da2661108http://www.namazu.org/security.html.en#xss-tabPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_01_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/12516
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/9028
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12053
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18623
Impacted products
Vendor Product Version
namazu namazu 2.0.7
namazu namazu 2.0.8
namazu namazu 2.0.13

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEE8D199-8F49-478E-B5A7-4901F11446FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "694F5F25-3A11-47C8-9007-B9E6BEFAC0ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:namazu:namazu:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB42D2-C51A-4C2B-97DC-308246D7D853",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in namazu.cgi for Namazu 2.0.13 and earlier allows remote attackers to inject arbitrary HTML and web script via a query that starts with a tab (\"%09\") character, which prevents the rest of the query from being properly sanitized."
    }
  ],
  "id": "CVE-2004-1318",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-01-06T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/jp/JVN%23904429FE.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/13600"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/alerts/2005/Jan/1012802.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/alerts/2005/Jan/1012805.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2005/dsa-627"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.linuxsecurity.com/content/view/117604/102/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.namazu.org/security.html.en#xss-tab"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/12516"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/advisories/9028"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/12053"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18623"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/jp/JVN%23904429FE.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/13600"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/alerts/2005/Jan/1012802.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/alerts/2005/Jan/1012805.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2005/dsa-627"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.linuxsecurity.com/content/view/117604/102/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.namazu.org/security.html.en#xss-tab"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/12516"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/advisories/9028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/12053"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18623"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2001-1352

Vulnerability from fkie_nvd - Published: 2001-12-27 05:00 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:namazu:namazu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECC217CB-23A3-457D-81B5-368B62F06E0E",
              "versionEndIncluding": "2.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter."
    }
  ],
  "id": "CVE-2001-1352",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-12-27T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=100947261916155\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=101060476404565\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=101068116016472\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/5691"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=100947261916155\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=101060476404565\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=101068116016472\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/5691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2001-1351

Vulnerability from fkie_nvd - Published: 2001-12-25 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cross-site scripting vulnerability in Namazu 2.0.8 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the index file name that is displayed when displaying hit numbers.
Impacted products
Vendor Product Version
namazu namazu *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:namazu:namazu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B63CB3EF-BFDD-43A9-A997-7DB29F121EF0",
              "versionEndIncluding": "2.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting vulnerability in Namazu 2.0.8 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the index file name that is displayed when displaying hit numbers."
    }
  ],
  "id": "CVE-2001-1351",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-12-25T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/5690"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/5690"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2001-1350

Vulnerability from fkie_nvd - Published: 2001-11-25 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cross-site scripting vulnerability in namazu.cgi for Namazu 2.0.7 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the lang parameter.
Impacted products
Vendor Product Version
namazu namazu *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:namazu:namazu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57EAE8EC-B5E2-45A6-87C3-15A88AA384C8",
              "versionEndIncluding": "2.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting vulnerability in namazu.cgi for Namazu 2.0.7 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the lang parameter."
    }
  ],
  "id": "CVE-2001-1350",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-11-25T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://search.namazu.org/ml/namazu-devel-ja/msg02114.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://search.namazu.org/ml/namazu-devel-ja/msg02114.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2011-4711 (GCVE-0-2011-4711)

Vulnerability from cvelistv5 – Published: 2011-12-08 19:00 – Updated: 2024-08-07 00:16
VLAI?
Summary
Multiple directory traversal vulnerabilities in namazu.cgi in Namazu before 2.0.16 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) lang or (2) result parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:16:34.272Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.namazu.org/security.html#"
          },
          {
            "name": "namazu-namazu-directory-traversal(71489)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71489"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-11-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple directory traversal vulnerabilities in namazu.cgi in Namazu before 2.0.16 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) lang or (2) result parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.namazu.org/security.html#"
        },
        {
          "name": "namazu-namazu-directory-traversal(71489)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71489"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-4711",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple directory traversal vulnerabilities in namazu.cgi in Namazu before 2.0.16 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) lang or (2) result parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.namazu.org/security.html#",
              "refsource": "CONFIRM",
              "url": "http://www.namazu.org/security.html#"
            },
            {
              "name": "namazu-namazu-directory-traversal(71489)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71489"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-4711",
    "datePublished": "2011-12-08T19:00:00",
    "dateReserved": "2011-12-08T00:00:00",
    "dateUpdated": "2024-08-07T00:16:34.272Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-5028 (GCVE-0-2009-5028)

Vulnerability from cvelistv5 – Published: 2011-11-30 02:00 – Updated: 2024-08-07 07:24
VLAI?
Summary
Stack-based buffer overflow in Namazu before 2.0.20 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted request containing an empty uri field.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:24:53.775Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.59.8.28\u0026r2=1.59.8.29\u0026sortby=log"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
          },
          {
            "name": "50772",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/50772"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756341"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.77.2.8\u0026r2=1.77.2.9\u0026sortby=log"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.86\u0026r2=1.87\u0026sortby=log"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.namazu.org/security.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-11-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in Namazu before 2.0.20 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted request containing an empty uri field."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-02-16T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.59.8.28\u0026r2=1.59.8.29\u0026sortby=log"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
        },
        {
          "name": "50772",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/50772"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756341"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.77.2.8\u0026r2=1.77.2.9\u0026sortby=log"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.86\u0026r2=1.87\u0026sortby=log"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.namazu.org/security.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-5028",
    "datePublished": "2011-11-30T02:00:00",
    "dateReserved": "2010-12-09T00:00:00",
    "dateUpdated": "2024-08-07T07:24:53.775Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-4345 (GCVE-0-2011-4345)

Vulnerability from cvelistv5 – Published: 2011-11-30 02:00 – Updated: 2024-08-07 00:01
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Namazu before 2.0.21, when Internet Explorer 6 or 7 is used, allows remote attackers to inject arbitrary web script or HTML via a cookie.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:01:51.638Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756348"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
          },
          {
            "name": "50771",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/50771"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.namazu.org/security.html#cross-site-scripting"
          },
          {
            "name": "46925",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46925"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-11-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Namazu before 2.0.21, when Internet Explorer 6 or 7 is used, allows remote attackers to inject arbitrary web script or HTML via a cookie."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-02-16T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756348"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
        },
        {
          "name": "50771",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/50771"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.namazu.org/security.html#cross-site-scripting"
        },
        {
          "name": "46925",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46925"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-4345",
    "datePublished": "2011-11-30T02:00:00",
    "dateReserved": "2011-11-04T00:00:00",
    "dateUpdated": "2024-08-07T00:01:51.638Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1468 (GCVE-0-2008-1468)

Vulnerability from cvelistv5 – Published: 2008-03-24 21:00 – Updated: 2024-08-07 08:24
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in namazu.cgi in Namazu before 2.0.18 allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded input, related to failure to set the charset, a different vector than CVE-2004-1318 and CVE-2001-1350. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=127239985506823&w=2 vendor-advisoryx_refsource_HP
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/29561 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/31687 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://www.securityfocus.com/bid/28380 vdb-entryx_refsource_BID
http://jvn.jp/jp/JVN%2300892830/index.html third-party-advisoryx_refsource_JVN
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/39645 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.namazu.org/security.html.en x_refsource_CONFIRM
http://secunia.com/advisories/29386 third-party-advisoryx_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=127239985506823&w=2 vendor-advisoryx_refsource_HP
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:24:42.804Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "HPSBMA02525",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127239985506823\u0026w=2"
          },
          {
            "name": "SUSE-SR:2008:017",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
          },
          {
            "name": "29561",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29561"
          },
          {
            "name": "31687",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31687"
          },
          {
            "name": "FEDORA-2008-2678",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00575.html"
          },
          {
            "name": "HPSBMA02492",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444"
          },
          {
            "name": "28380",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28380"
          },
          {
            "name": "JVN#00892830",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/jp/JVN%2300892830/index.html"
          },
          {
            "name": "FEDORA-2008-2767",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00654.html"
          },
          {
            "name": "39645",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39645"
          },
          {
            "name": "namazu-character-encoding-xss(41360)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41360"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.namazu.org/security.html.en"
          },
          {
            "name": "29386",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29386"
          },
          {
            "name": "SSRT100083",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127239985506823\u0026w=2"
          },
          {
            "name": "SSRT100079",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in namazu.cgi in Namazu before 2.0.18 allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded input, related to failure to set the charset, a different vector than CVE-2004-1318 and CVE-2001-1350. NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "HPSBMA02525",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127239985506823\u0026w=2"
        },
        {
          "name": "SUSE-SR:2008:017",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
        },
        {
          "name": "29561",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29561"
        },
        {
          "name": "31687",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31687"
        },
        {
          "name": "FEDORA-2008-2678",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00575.html"
        },
        {
          "name": "HPSBMA02492",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444"
        },
        {
          "name": "28380",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28380"
        },
        {
          "name": "JVN#00892830",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/jp/JVN%2300892830/index.html"
        },
        {
          "name": "FEDORA-2008-2767",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00654.html"
        },
        {
          "name": "39645",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39645"
        },
        {
          "name": "namazu-character-encoding-xss(41360)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41360"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.namazu.org/security.html.en"
        },
        {
          "name": "29386",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29386"
        },
        {
          "name": "SSRT100083",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127239985506823\u0026w=2"
        },
        {
          "name": "SSRT100079",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1468",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in namazu.cgi in Namazu before 2.0.18 allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded input, related to failure to set the charset, a different vector than CVE-2004-1318 and CVE-2001-1350. NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "HPSBMA02525",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=127239985506823\u0026w=2"
            },
            {
              "name": "SUSE-SR:2008:017",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
            },
            {
              "name": "29561",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29561"
            },
            {
              "name": "31687",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31687"
            },
            {
              "name": "FEDORA-2008-2678",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00575.html"
            },
            {
              "name": "HPSBMA02492",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444"
            },
            {
              "name": "28380",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28380"
            },
            {
              "name": "JVN#00892830",
              "refsource": "JVN",
              "url": "http://jvn.jp/jp/JVN%2300892830/index.html"
            },
            {
              "name": "FEDORA-2008-2767",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00654.html"
            },
            {
              "name": "39645",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/39645"
            },
            {
              "name": "namazu-character-encoding-xss(41360)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41360"
            },
            {
              "name": "http://www.namazu.org/security.html.en",
              "refsource": "CONFIRM",
              "url": "http://www.namazu.org/security.html.en"
            },
            {
              "name": "29386",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29386"
            },
            {
              "name": "SSRT100083",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=127239985506823\u0026w=2"
            },
            {
              "name": "SSRT100079",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1468",
    "datePublished": "2008-03-24T21:00:00",
    "dateReserved": "2008-03-24T00:00:00",
    "dateUpdated": "2024-08-07T08:24:42.804Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-1318 (GCVE-0-2004-1318)

Vulnerability from cvelistv5 – Published: 2005-01-06 05:00 – Updated: 2024-08-08 00:46
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in namazu.cgi for Namazu 2.0.13 and earlier allows remote attackers to inject arbitrary HTML and web script via a query that starts with a tab ("%09") character, which prevents the rest of the query from being properly sanitized.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:46:12.339Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1012805",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/alerts/2005/Jan/1012805.html"
          },
          {
            "name": "1012802",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/alerts/2005/Jan/1012802.html"
          },
          {
            "name": "DSA-627",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-627"
          },
          {
            "name": "13600",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/13600"
          },
          {
            "name": "namazu-tab-query-xss(18623)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18623"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.namazu.org/security.html.en#xss-tab"
          },
          {
            "name": "12053",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12053"
          },
          {
            "name": "SUSE-SR:2005:001",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html"
          },
          {
            "name": "FEDORA-2004-557",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.linuxsecurity.com/content/view/117604/102/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://jvn.jp/jp/JVN%23904429FE.html"
          },
          {
            "name": "12516",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/12516"
          },
          {
            "name": "HPSBMA01212",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/advisories/9028"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-12-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in namazu.cgi for Namazu 2.0.13 and earlier allows remote attackers to inject arbitrary HTML and web script via a query that starts with a tab (\"%09\") character, which prevents the rest of the query from being properly sanitized."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1012805",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/alerts/2005/Jan/1012805.html"
        },
        {
          "name": "1012802",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/alerts/2005/Jan/1012802.html"
        },
        {
          "name": "DSA-627",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-627"
        },
        {
          "name": "13600",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/13600"
        },
        {
          "name": "namazu-tab-query-xss(18623)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18623"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.namazu.org/security.html.en#xss-tab"
        },
        {
          "name": "12053",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12053"
        },
        {
          "name": "SUSE-SR:2005:001",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html"
        },
        {
          "name": "FEDORA-2004-557",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.linuxsecurity.com/content/view/117604/102/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://jvn.jp/jp/JVN%23904429FE.html"
        },
        {
          "name": "12516",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/12516"
        },
        {
          "name": "HPSBMA01212",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/advisories/9028"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1318",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in namazu.cgi for Namazu 2.0.13 and earlier allows remote attackers to inject arbitrary HTML and web script via a query that starts with a tab (\"%09\") character, which prevents the rest of the query from being properly sanitized."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1012805",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/alerts/2005/Jan/1012805.html"
            },
            {
              "name": "1012802",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/alerts/2005/Jan/1012802.html"
            },
            {
              "name": "DSA-627",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-627"
            },
            {
              "name": "13600",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/13600"
            },
            {
              "name": "namazu-tab-query-xss(18623)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18623"
            },
            {
              "name": "http://www.namazu.org/security.html.en#xss-tab",
              "refsource": "CONFIRM",
              "url": "http://www.namazu.org/security.html.en#xss-tab"
            },
            {
              "name": "12053",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12053"
            },
            {
              "name": "SUSE-SR:2005:001",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html"
            },
            {
              "name": "FEDORA-2004-557",
              "refsource": "FEDORA",
              "url": "http://www.linuxsecurity.com/content/view/117604/102/"
            },
            {
              "name": "http://jvn.jp/jp/JVN%23904429FE.html",
              "refsource": "MISC",
              "url": "http://jvn.jp/jp/JVN%23904429FE.html"
            },
            {
              "name": "12516",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/12516"
            },
            {
              "name": "HPSBMA01212",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/advisories/9028"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1318",
    "datePublished": "2005-01-06T05:00:00",
    "dateReserved": "2005-01-03T00:00:00",
    "dateUpdated": "2024-08-08T00:46:12.339Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-1351 (GCVE-0-2001-1351)

Vulnerability from cvelistv5 – Published: 2004-09-01 04:00 – Updated: 2024-08-08 04:51
VLAI?
Summary
Cross-site scripting vulnerability in Namazu 2.0.8 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the index file name that is displayed when displaying hit numbers.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&w=2&r=1&s=namazu&q=b vendor-advisoryx_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.osvdb.org/5690 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:51:08.214Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2001:162",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
          },
          {
            "name": "linux-namazu-css(7875)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
          },
          {
            "name": "5690",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/5690"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-12-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting vulnerability in Namazu 2.0.8 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the index file name that is displayed when displaying hit numbers."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2004-08-18T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "RHSA-2001:162",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
        },
        {
          "name": "linux-namazu-css(7875)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
        },
        {
          "name": "5690",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/5690"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1351",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting vulnerability in Namazu 2.0.8 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the index file name that is displayed when displaying hit numbers."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2001:162",
              "refsource": "REDHAT",
              "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
            },
            {
              "name": "linux-namazu-css(7875)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
            },
            {
              "name": "5690",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/5690"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1351",
    "datePublished": "2004-09-01T04:00:00",
    "dateReserved": "2002-06-02T00:00:00",
    "dateUpdated": "2024-08-08T04:51:08.214Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-1352 (GCVE-0-2001-1352)

Vulnerability from cvelistv5 – Published: 2004-09-01 04:00 – Updated: 2024-08-08 04:51
VLAI?
Summary
Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=101068116016472&w=2 mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.osvdb.org/5691 vdb-entryx_refsource_OSVDB
http://marc.info/?l=bugtraq&m=100947261916155&w=2 mailing-listx_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=101060476404565&w=2 vendor-advisoryx_refsource_REDHAT
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:51:08.402Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020109 Details on the updated namazu packages that are available",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=101068116016472\u0026w=2"
          },
          {
            "name": "linux-namazu-css(7875)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
          },
          {
            "name": "5691",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/5691"
          },
          {
            "name": "20011227 Re: [RHSA-2001:162-04] Updated namazu packages are available",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=100947261916155\u0026w=2"
          },
          {
            "name": "RHSA-2001:179",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=101060476404565\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-12-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2004-08-18T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020109 Details on the updated namazu packages that are available",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=101068116016472\u0026w=2"
        },
        {
          "name": "linux-namazu-css(7875)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
        },
        {
          "name": "5691",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/5691"
        },
        {
          "name": "20011227 Re: [RHSA-2001:162-04] Updated namazu packages are available",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=100947261916155\u0026w=2"
        },
        {
          "name": "RHSA-2001:179",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=101060476404565\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1352",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020109 Details on the updated namazu packages that are available",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=101068116016472\u0026w=2"
            },
            {
              "name": "linux-namazu-css(7875)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
            },
            {
              "name": "5691",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/5691"
            },
            {
              "name": "20011227 Re: [RHSA-2001:162-04] Updated namazu packages are available",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=100947261916155\u0026w=2"
            },
            {
              "name": "RHSA-2001:179",
              "refsource": "REDHAT",
              "url": "http://marc.info/?l=bugtraq\u0026m=101060476404565\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1352",
    "datePublished": "2004-09-01T04:00:00",
    "dateReserved": "2002-06-02T00:00:00",
    "dateUpdated": "2024-08-08T04:51:08.402Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-1350 (GCVE-0-2001-1350)

Vulnerability from cvelistv5 – Published: 2004-09-01 04:00 – Updated: 2024-08-08 04:51
VLAI?
Summary
Cross-site scripting vulnerability in namazu.cgi for Namazu 2.0.7 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the lang parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:51:08.131Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2001:162",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://search.namazu.org/ml/namazu-devel-ja/msg02114.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-12-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting vulnerability in namazu.cgi for Namazu 2.0.7 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the lang parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2004-07-25T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "RHSA-2001:162",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://search.namazu.org/ml/namazu-devel-ja/msg02114.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1350",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting vulnerability in namazu.cgi for Namazu 2.0.7 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the lang parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2001:162",
              "refsource": "REDHAT",
              "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
            },
            {
              "name": "http://search.namazu.org/ml/namazu-devel-ja/msg02114.html",
              "refsource": "MISC",
              "url": "http://search.namazu.org/ml/namazu-devel-ja/msg02114.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1350",
    "datePublished": "2004-09-01T04:00:00",
    "dateReserved": "2002-06-02T00:00:00",
    "dateUpdated": "2024-08-08T04:51:08.131Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-4711 (GCVE-0-2011-4711)

Vulnerability from nvd – Published: 2011-12-08 19:00 – Updated: 2024-08-07 00:16
VLAI?
Summary
Multiple directory traversal vulnerabilities in namazu.cgi in Namazu before 2.0.16 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) lang or (2) result parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:16:34.272Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.namazu.org/security.html#"
          },
          {
            "name": "namazu-namazu-directory-traversal(71489)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71489"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-11-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple directory traversal vulnerabilities in namazu.cgi in Namazu before 2.0.16 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) lang or (2) result parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.namazu.org/security.html#"
        },
        {
          "name": "namazu-namazu-directory-traversal(71489)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71489"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-4711",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple directory traversal vulnerabilities in namazu.cgi in Namazu before 2.0.16 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) lang or (2) result parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.namazu.org/security.html#",
              "refsource": "CONFIRM",
              "url": "http://www.namazu.org/security.html#"
            },
            {
              "name": "namazu-namazu-directory-traversal(71489)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71489"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-4711",
    "datePublished": "2011-12-08T19:00:00",
    "dateReserved": "2011-12-08T00:00:00",
    "dateUpdated": "2024-08-07T00:16:34.272Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-5028 (GCVE-0-2009-5028)

Vulnerability from nvd – Published: 2011-11-30 02:00 – Updated: 2024-08-07 07:24
VLAI?
Summary
Stack-based buffer overflow in Namazu before 2.0.20 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted request containing an empty uri field.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:24:53.775Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.59.8.28\u0026r2=1.59.8.29\u0026sortby=log"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
          },
          {
            "name": "50772",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/50772"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756341"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.77.2.8\u0026r2=1.77.2.9\u0026sortby=log"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.86\u0026r2=1.87\u0026sortby=log"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.namazu.org/security.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-11-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in Namazu before 2.0.20 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted request containing an empty uri field."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-02-16T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.59.8.28\u0026r2=1.59.8.29\u0026sortby=log"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
        },
        {
          "name": "50772",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/50772"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756341"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.77.2.8\u0026r2=1.77.2.9\u0026sortby=log"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.namazu.org/namazu/src/result.c?sortdir=down\u0026r1=1.86\u0026r2=1.87\u0026sortby=log"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.namazu.org/security.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-5028",
    "datePublished": "2011-11-30T02:00:00",
    "dateReserved": "2010-12-09T00:00:00",
    "dateUpdated": "2024-08-07T07:24:53.775Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-4345 (GCVE-0-2011-4345)

Vulnerability from nvd – Published: 2011-11-30 02:00 – Updated: 2024-08-07 00:01
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Namazu before 2.0.21, when Internet Explorer 6 or 7 is used, allows remote attackers to inject arbitrary web script or HTML via a cookie.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:01:51.638Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756348"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
          },
          {
            "name": "50771",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/50771"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.namazu.org/security.html#cross-site-scripting"
          },
          {
            "name": "46925",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46925"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-11-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Namazu before 2.0.21, when Internet Explorer 6 or 7 is used, allows remote attackers to inject arbitrary web script or HTML via a cookie."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-02-16T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756348"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
        },
        {
          "name": "50771",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/50771"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.namazu.org/security.html#cross-site-scripting"
        },
        {
          "name": "46925",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46925"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-4345",
    "datePublished": "2011-11-30T02:00:00",
    "dateReserved": "2011-11-04T00:00:00",
    "dateUpdated": "2024-08-07T00:01:51.638Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1468 (GCVE-0-2008-1468)

Vulnerability from nvd – Published: 2008-03-24 21:00 – Updated: 2024-08-07 08:24
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in namazu.cgi in Namazu before 2.0.18 allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded input, related to failure to set the charset, a different vector than CVE-2004-1318 and CVE-2001-1350. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=127239985506823&w=2 vendor-advisoryx_refsource_HP
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/29561 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/31687 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://www.securityfocus.com/bid/28380 vdb-entryx_refsource_BID
http://jvn.jp/jp/JVN%2300892830/index.html third-party-advisoryx_refsource_JVN
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/39645 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.namazu.org/security.html.en x_refsource_CONFIRM
http://secunia.com/advisories/29386 third-party-advisoryx_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=127239985506823&w=2 vendor-advisoryx_refsource_HP
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:24:42.804Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "HPSBMA02525",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127239985506823\u0026w=2"
          },
          {
            "name": "SUSE-SR:2008:017",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
          },
          {
            "name": "29561",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29561"
          },
          {
            "name": "31687",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31687"
          },
          {
            "name": "FEDORA-2008-2678",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00575.html"
          },
          {
            "name": "HPSBMA02492",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444"
          },
          {
            "name": "28380",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28380"
          },
          {
            "name": "JVN#00892830",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/jp/JVN%2300892830/index.html"
          },
          {
            "name": "FEDORA-2008-2767",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00654.html"
          },
          {
            "name": "39645",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39645"
          },
          {
            "name": "namazu-character-encoding-xss(41360)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41360"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.namazu.org/security.html.en"
          },
          {
            "name": "29386",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29386"
          },
          {
            "name": "SSRT100083",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127239985506823\u0026w=2"
          },
          {
            "name": "SSRT100079",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in namazu.cgi in Namazu before 2.0.18 allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded input, related to failure to set the charset, a different vector than CVE-2004-1318 and CVE-2001-1350. NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "HPSBMA02525",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127239985506823\u0026w=2"
        },
        {
          "name": "SUSE-SR:2008:017",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
        },
        {
          "name": "29561",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29561"
        },
        {
          "name": "31687",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31687"
        },
        {
          "name": "FEDORA-2008-2678",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00575.html"
        },
        {
          "name": "HPSBMA02492",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444"
        },
        {
          "name": "28380",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28380"
        },
        {
          "name": "JVN#00892830",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/jp/JVN%2300892830/index.html"
        },
        {
          "name": "FEDORA-2008-2767",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00654.html"
        },
        {
          "name": "39645",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39645"
        },
        {
          "name": "namazu-character-encoding-xss(41360)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41360"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.namazu.org/security.html.en"
        },
        {
          "name": "29386",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29386"
        },
        {
          "name": "SSRT100083",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127239985506823\u0026w=2"
        },
        {
          "name": "SSRT100079",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1468",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in namazu.cgi in Namazu before 2.0.18 allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded input, related to failure to set the charset, a different vector than CVE-2004-1318 and CVE-2001-1350. NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "HPSBMA02525",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=127239985506823\u0026w=2"
            },
            {
              "name": "SUSE-SR:2008:017",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
            },
            {
              "name": "29561",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29561"
            },
            {
              "name": "31687",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31687"
            },
            {
              "name": "FEDORA-2008-2678",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00575.html"
            },
            {
              "name": "HPSBMA02492",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444"
            },
            {
              "name": "28380",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28380"
            },
            {
              "name": "JVN#00892830",
              "refsource": "JVN",
              "url": "http://jvn.jp/jp/JVN%2300892830/index.html"
            },
            {
              "name": "FEDORA-2008-2767",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00654.html"
            },
            {
              "name": "39645",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/39645"
            },
            {
              "name": "namazu-character-encoding-xss(41360)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41360"
            },
            {
              "name": "http://www.namazu.org/security.html.en",
              "refsource": "CONFIRM",
              "url": "http://www.namazu.org/security.html.en"
            },
            {
              "name": "29386",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29386"
            },
            {
              "name": "SSRT100083",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=127239985506823\u0026w=2"
            },
            {
              "name": "SSRT100079",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1468",
    "datePublished": "2008-03-24T21:00:00",
    "dateReserved": "2008-03-24T00:00:00",
    "dateUpdated": "2024-08-07T08:24:42.804Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-1318 (GCVE-0-2004-1318)

Vulnerability from nvd – Published: 2005-01-06 05:00 – Updated: 2024-08-08 00:46
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in namazu.cgi for Namazu 2.0.13 and earlier allows remote attackers to inject arbitrary HTML and web script via a query that starts with a tab ("%09") character, which prevents the rest of the query from being properly sanitized.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:46:12.339Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1012805",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/alerts/2005/Jan/1012805.html"
          },
          {
            "name": "1012802",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/alerts/2005/Jan/1012802.html"
          },
          {
            "name": "DSA-627",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-627"
          },
          {
            "name": "13600",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/13600"
          },
          {
            "name": "namazu-tab-query-xss(18623)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18623"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.namazu.org/security.html.en#xss-tab"
          },
          {
            "name": "12053",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12053"
          },
          {
            "name": "SUSE-SR:2005:001",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html"
          },
          {
            "name": "FEDORA-2004-557",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.linuxsecurity.com/content/view/117604/102/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://jvn.jp/jp/JVN%23904429FE.html"
          },
          {
            "name": "12516",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/12516"
          },
          {
            "name": "HPSBMA01212",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/advisories/9028"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-12-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in namazu.cgi for Namazu 2.0.13 and earlier allows remote attackers to inject arbitrary HTML and web script via a query that starts with a tab (\"%09\") character, which prevents the rest of the query from being properly sanitized."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1012805",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/alerts/2005/Jan/1012805.html"
        },
        {
          "name": "1012802",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/alerts/2005/Jan/1012802.html"
        },
        {
          "name": "DSA-627",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-627"
        },
        {
          "name": "13600",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/13600"
        },
        {
          "name": "namazu-tab-query-xss(18623)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18623"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.namazu.org/security.html.en#xss-tab"
        },
        {
          "name": "12053",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12053"
        },
        {
          "name": "SUSE-SR:2005:001",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html"
        },
        {
          "name": "FEDORA-2004-557",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.linuxsecurity.com/content/view/117604/102/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://jvn.jp/jp/JVN%23904429FE.html"
        },
        {
          "name": "12516",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/12516"
        },
        {
          "name": "HPSBMA01212",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/advisories/9028"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1318",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in namazu.cgi for Namazu 2.0.13 and earlier allows remote attackers to inject arbitrary HTML and web script via a query that starts with a tab (\"%09\") character, which prevents the rest of the query from being properly sanitized."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1012805",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/alerts/2005/Jan/1012805.html"
            },
            {
              "name": "1012802",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/alerts/2005/Jan/1012802.html"
            },
            {
              "name": "DSA-627",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-627"
            },
            {
              "name": "13600",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/13600"
            },
            {
              "name": "namazu-tab-query-xss(18623)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18623"
            },
            {
              "name": "http://www.namazu.org/security.html.en#xss-tab",
              "refsource": "CONFIRM",
              "url": "http://www.namazu.org/security.html.en#xss-tab"
            },
            {
              "name": "12053",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12053"
            },
            {
              "name": "SUSE-SR:2005:001",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html"
            },
            {
              "name": "FEDORA-2004-557",
              "refsource": "FEDORA",
              "url": "http://www.linuxsecurity.com/content/view/117604/102/"
            },
            {
              "name": "http://jvn.jp/jp/JVN%23904429FE.html",
              "refsource": "MISC",
              "url": "http://jvn.jp/jp/JVN%23904429FE.html"
            },
            {
              "name": "12516",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/12516"
            },
            {
              "name": "HPSBMA01212",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/advisories/9028"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1318",
    "datePublished": "2005-01-06T05:00:00",
    "dateReserved": "2005-01-03T00:00:00",
    "dateUpdated": "2024-08-08T00:46:12.339Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-1351 (GCVE-0-2001-1351)

Vulnerability from nvd – Published: 2004-09-01 04:00 – Updated: 2024-08-08 04:51
VLAI?
Summary
Cross-site scripting vulnerability in Namazu 2.0.8 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the index file name that is displayed when displaying hit numbers.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&w=2&r=1&s=namazu&q=b vendor-advisoryx_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.osvdb.org/5690 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:51:08.214Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2001:162",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
          },
          {
            "name": "linux-namazu-css(7875)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
          },
          {
            "name": "5690",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/5690"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-12-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting vulnerability in Namazu 2.0.8 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the index file name that is displayed when displaying hit numbers."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2004-08-18T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "RHSA-2001:162",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
        },
        {
          "name": "linux-namazu-css(7875)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
        },
        {
          "name": "5690",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/5690"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1351",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting vulnerability in Namazu 2.0.8 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the index file name that is displayed when displaying hit numbers."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2001:162",
              "refsource": "REDHAT",
              "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
            },
            {
              "name": "linux-namazu-css(7875)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
            },
            {
              "name": "5690",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/5690"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1351",
    "datePublished": "2004-09-01T04:00:00",
    "dateReserved": "2002-06-02T00:00:00",
    "dateUpdated": "2024-08-08T04:51:08.214Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-1352 (GCVE-0-2001-1352)

Vulnerability from nvd – Published: 2004-09-01 04:00 – Updated: 2024-08-08 04:51
VLAI?
Summary
Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=101068116016472&w=2 mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.osvdb.org/5691 vdb-entryx_refsource_OSVDB
http://marc.info/?l=bugtraq&m=100947261916155&w=2 mailing-listx_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=101060476404565&w=2 vendor-advisoryx_refsource_REDHAT
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:51:08.402Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020109 Details on the updated namazu packages that are available",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=101068116016472\u0026w=2"
          },
          {
            "name": "linux-namazu-css(7875)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
          },
          {
            "name": "5691",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/5691"
          },
          {
            "name": "20011227 Re: [RHSA-2001:162-04] Updated namazu packages are available",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=100947261916155\u0026w=2"
          },
          {
            "name": "RHSA-2001:179",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=101060476404565\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-12-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2004-08-18T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020109 Details on the updated namazu packages that are available",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=101068116016472\u0026w=2"
        },
        {
          "name": "linux-namazu-css(7875)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
        },
        {
          "name": "5691",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/5691"
        },
        {
          "name": "20011227 Re: [RHSA-2001:162-04] Updated namazu packages are available",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=100947261916155\u0026w=2"
        },
        {
          "name": "RHSA-2001:179",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=101060476404565\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1352",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020109 Details on the updated namazu packages that are available",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=101068116016472\u0026w=2"
            },
            {
              "name": "linux-namazu-css(7875)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7875"
            },
            {
              "name": "5691",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/5691"
            },
            {
              "name": "20011227 Re: [RHSA-2001:162-04] Updated namazu packages are available",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=100947261916155\u0026w=2"
            },
            {
              "name": "RHSA-2001:179",
              "refsource": "REDHAT",
              "url": "http://marc.info/?l=bugtraq\u0026m=101060476404565\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1352",
    "datePublished": "2004-09-01T04:00:00",
    "dateReserved": "2002-06-02T00:00:00",
    "dateUpdated": "2024-08-08T04:51:08.402Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-1350 (GCVE-0-2001-1350)

Vulnerability from nvd – Published: 2004-09-01 04:00 – Updated: 2024-08-08 04:51
VLAI?
Summary
Cross-site scripting vulnerability in namazu.cgi for Namazu 2.0.7 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the lang parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:51:08.131Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2001:162",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://search.namazu.org/ml/namazu-devel-ja/msg02114.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-12-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting vulnerability in namazu.cgi for Namazu 2.0.7 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the lang parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2004-07-25T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "RHSA-2001:162",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://search.namazu.org/ml/namazu-devel-ja/msg02114.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1350",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting vulnerability in namazu.cgi for Namazu 2.0.7 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the lang parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2001:162",
              "refsource": "REDHAT",
              "url": "http://marc.info/?l=bugtraq\u0026w=2\u0026r=1\u0026s=namazu\u0026q=b"
            },
            {
              "name": "http://search.namazu.org/ml/namazu-devel-ja/msg02114.html",
              "refsource": "MISC",
              "url": "http://search.namazu.org/ml/namazu-devel-ja/msg02114.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1350",
    "datePublished": "2004-09-01T04:00:00",
    "dateReserved": "2002-06-02T00:00:00",
    "dateUpdated": "2024-08-08T04:51:08.131Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}