Search criteria
36 vulnerabilities found for trac by edgewall_software
FKIE_CVE-2008-3328
Vulnerability from fkie_nvd - Published: 2008-07-27 22:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| edgewall_software | trac | * | |
| edgewall_software | trac | 0.5 | |
| edgewall_software | trac | 0.5.1 | |
| edgewall_software | trac | 0.5.2 | |
| edgewall_software | trac | 0.6 | |
| edgewall_software | trac | 0.6.1 | |
| edgewall_software | trac | 0.7 | |
| edgewall_software | trac | 0.7.1 | |
| edgewall_software | trac | 0.8 | |
| edgewall_software | trac | 0.8.1 | |
| edgewall_software | trac | 0.8.2 | |
| edgewall_software | trac | 0.8.3 | |
| edgewall_software | trac | 0.8.4 | |
| edgewall_software | trac | 0.9 | |
| edgewall_software | trac | 0.9.1 | |
| edgewall_software | trac | 0.9.2 | |
| edgewall_software | trac | 0.9.3 | |
| edgewall_software | trac | 0.9.4 | |
| edgewall_software | trac | 0.9.5 | |
| edgewall_software | trac | 0.9.6 | |
| edgewall_software | trac | 0.9b1 | |
| edgewall_software | trac | 0.9b2 | |
| edgewall_software | trac | 0.10 | |
| edgewall_software | trac | 0.10.1 | |
| edgewall_software | trac | 0.10.2 | |
| edgewall_software | trac | 0.10.3 | |
| edgewall_software | trac | 0.10.3.1 | |
| edgewall_software | trac | 0.50.9 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:edgewall_software:trac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E3F59DB-563B-40B4-84A5-6264B189D43D",
"versionEndIncluding": "0.10.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "27CD4ECA-7609-446F-A3FB-3E6ACA42ABC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5631A575-5CA5-4421-B75A-073DE829E247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "801E19E5-2CE7-41B3-9727-C4F3222BE23B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C0A90354-05CE-44CB-B658-3B80795001BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "91A51BD2-A54A-4D3D-B0DA-57055110BF85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FEEF99-F54D-4542-AF3A-E94D976420A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8DAF74C-8188-4F29-ACDA-ACEE3B02CB24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2FAC175D-2893-45B6-9B4E-AD35571FF08E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4A1430A5-5C85-45FF-9E9F-2FEF9EABC603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94221B90-8F50-426D-87C7-3A1ABABAF354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C70CF2A2-AE61-4A48-B6A7-108358D55A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4BB9D21E-A75E-4B9A-861E-51F8D99463B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "ACF7E7DA-385E-4C8E-90BF-308213EA0550",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C62BB91A-3627-4149-9935-86BB5FF5EE62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AF72084-56B5-4E1B-B701-887984789068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "354FEA3C-9626-4DD1-ADCA-F94F616C6972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F8BF7DA3-8B16-4883-9184-817E85B04395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CEF7CA9C-2312-405F-8497-E05AB8383976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "12F2E7FF-B518-4217-A28A-0A8F03CE6B9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9b1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C291732-9D53-4641-BFBB-F9BD5F1D485C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9b2:*:*:*:*:*:*:*",
"matchCriteriaId": "DCE33859-583E-4F06-BC30-37DB4D59F904",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "380AFEFF-64A3-43A7-8EBB-88829039A9EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "541460F8-30BC-40B3-ADE7-A0C8FAC7C34E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "393BF6C4-B455-4DDE-9A29-794AF3900F60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF703B1-B485-4D16-90C9-820A2780AE2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.10.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5DFB2875-DF31-4B5C-BFCF-111E028A50B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.50.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A8196233-19A2-4617-87A9-12D8DB10D91F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en el Motor del wiki en Trac anterior a 0.10.5, permite a atacantes remotos inyectar secuencias de comandos web y HTML de su elecci\u00f3n a trav\u00e9s de vectores desconocidos."
}
],
"id": "CVE-2008-3328",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2008-07-27T22:41:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/31231"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/31314"
},
{
"source": "cve@mitre.org",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/30400"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/2223/references"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31231"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31314"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/30400"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/2223/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-1405
Vulnerability from fkie_nvd - Published: 2007-03-10 22:19 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the "download wiki page as text" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| edgewall_software | trac | 0.10 | |
| edgewall_software | trac | 0.10.1 | |
| edgewall_software | trac | 0.10.2 | |
| edgewall_software | trac | 0.10.3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "380AFEFF-64A3-43A7-8EBB-88829039A9EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "541460F8-30BC-40B3-ADE7-A0C8FAC7C34E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "393BF6C4-B455-4DDE-9A29-794AF3900F60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF703B1-B485-4D16-90C9-820A2780AE2C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the \"download wiki page as text\" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en la caracter\u00edstica \"descargar wiki como p\u00e1gina de texto\" en Trac anterior a 0.10.3.1, cuando se utiliza Microsoft Internet Explorer, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de par\u00e1metros no especificados."
}
],
"id": "CVE-2007-1405",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2007-03-10T22:19:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24470"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22888"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/0900"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24470"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22888"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/0900"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-1406
Vulnerability from fkie_nvd - Published: 2007-03-10 22:19 - Updated: 2025-04-09 00:30
Severity ?
Summary
Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain "unsafe" situations, which has unknown impact and remote attack vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| edgewall_software | trac | 0.10 | |
| edgewall_software | trac | 0.10.1 | |
| edgewall_software | trac | 0.10.2 | |
| edgewall_software | trac | 0.10.3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "380AFEFF-64A3-43A7-8EBB-88829039A9EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "541460F8-30BC-40B3-ADE7-A0C8FAC7C34E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "393BF6C4-B455-4DDE-9A29-794AF3900F60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF703B1-B485-4D16-90C9-820A2780AE2C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain \"unsafe\" situations, which has unknown impact and remote attack vectors."
},
{
"lang": "es",
"value": "Trac anterior a 0.10.3.1 no env\u00eda una cabecera de disposici\u00f3n de contenido HTTP especificando un adjunto en ciertas situaciones \"no seguras\", lo cual tiene un impacto desconocido y vectores de ataque remotos."
}
],
"evaluatorComment": "This vulnerability has been addressed by the following vendor update:\r\nhttp://trac.edgewall.org/wiki/TracDownload",
"id": "CVE-2007-1406",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-03-10T22:19:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-5878
Vulnerability from fkie_nvd - Published: 2006-11-14 19:07 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| edgewall_software | trac | * | |
| edgewall_software | trac | 0.5 | |
| edgewall_software | trac | 0.5.1 | |
| edgewall_software | trac | 0.5.2 | |
| edgewall_software | trac | 0.6 | |
| edgewall_software | trac | 0.6.1 | |
| edgewall_software | trac | 0.7 | |
| edgewall_software | trac | 0.7.1 | |
| edgewall_software | trac | 0.8 | |
| edgewall_software | trac | 0.8.1 | |
| edgewall_software | trac | 0.8.2 | |
| edgewall_software | trac | 0.8.3 | |
| edgewall_software | trac | 0.8.4 | |
| edgewall_software | trac | 0.9 | |
| edgewall_software | trac | 0.9.1 | |
| edgewall_software | trac | 0.9.2 | |
| edgewall_software | trac | 0.9.3 | |
| edgewall_software | trac | 0.9.4 | |
| edgewall_software | trac | 0.9.5 | |
| edgewall_software | trac | 0.9.6 | |
| edgewall_software | trac | 0.9b1 | |
| edgewall_software | trac | 0.9b2 | |
| edgewall_software | trac | 0.50.9 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:edgewall_software:trac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D865B6A-E912-4BCA-9514-047054EA22AC",
"versionEndIncluding": "0.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "27CD4ECA-7609-446F-A3FB-3E6ACA42ABC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5631A575-5CA5-4421-B75A-073DE829E247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "801E19E5-2CE7-41B3-9727-C4F3222BE23B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C0A90354-05CE-44CB-B658-3B80795001BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "91A51BD2-A54A-4D3D-B0DA-57055110BF85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FEEF99-F54D-4542-AF3A-E94D976420A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8DAF74C-8188-4F29-ACDA-ACEE3B02CB24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2FAC175D-2893-45B6-9B4E-AD35571FF08E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4A1430A5-5C85-45FF-9E9F-2FEF9EABC603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94221B90-8F50-426D-87C7-3A1ABABAF354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C70CF2A2-AE61-4A48-B6A7-108358D55A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4BB9D21E-A75E-4B9A-861E-51F8D99463B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "ACF7E7DA-385E-4C8E-90BF-308213EA0550",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C62BB91A-3627-4149-9935-86BB5FF5EE62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AF72084-56B5-4E1B-B701-887984789068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "354FEA3C-9626-4DD1-ADCA-F94F616C6972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F8BF7DA3-8B16-4883-9184-817E85B04395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CEF7CA9C-2312-405F-8497-E05AB8383976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "12F2E7FF-B518-4217-A28A-0A8F03CE6B9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9b1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C291732-9D53-4641-BFBB-F9BD5F1D485C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9b2:*:*:*:*:*:*:*",
"matchCriteriaId": "DCE33859-583E-4F06-BC30-37DB4D59F904",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.50.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A8196233-19A2-4617-87A9-12D8DB10D91F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en Edgewall Trac 0.10 y anteriores permite a atacantes remotos realizar acciones no autorizadas como otros usuarios mediante vectores desconocidos."
}
],
"evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nEdgewall Software, Trac, 0.10.1",
"id": "CVE-2006-5878",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-11-14T19:07:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/22789"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/22868"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/23357"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
},
{
"source": "cve@mitre.org",
"url": "http://trac.edgewall.org/ticket/4049"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2006/dsa-1209"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/4422"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/22789"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/22868"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/23357"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://trac.edgewall.org/ticket/4049"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2006/dsa-1209"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/4422"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-3695
Vulnerability from fkie_nvd - Published: 2006-07-21 14:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Trac before 0.9.6 does not disable the "raw" or "include" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| edgewall_software | trac | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:edgewall_software:trac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9FC0F377-A06F-42B8-ACDF-EB59F0C912F7",
"versionEndIncluding": "0.9.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Trac before 0.9.6 does not disable the \"raw\" or \"include\" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458."
},
{
"lang": "es",
"value": "Trac anterior a 0.9.6 no deshabilita los comandos \"raw\" o \"nclude\" cuando se mantiene a usuarios no v\u00e1lidos con la funcionalidad de texto reestructurado (reStructuredText) desde docutils, lo cual permite a atacantes remotos leer archivos de su elecci\u00f3n, realizando ataques de secuencias de comandos en sitios cruzados (XSS), o provocar denegaci\u00f3n de servicio a trav\u00e9s de vectores no especificados. NOTA: esto podr\u00eda estar relacionado con CVE-2006-3458."
}
],
"evaluatorSolution": "Upgrade to 0.9.6",
"id": "CVE-2006-3695",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-07-21T14:03:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/20958"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21534"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1016457"
},
{
"source": "cve@mitre.org",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2006/dsa-1152"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/18323"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2006/2729"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/20958"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21534"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1016457"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2006/dsa-1152"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/18323"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2006/2729"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-2106
Vulnerability from fkie_nvd - Published: 2006-04-29 10:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a "wiki macro."
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| edgewall_software | trac | 0.9.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F8BF7DA3-8B16-4883-9184-817E85B04395",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a \"wiki macro.\""
}
],
"id": "CVE-2006-2106",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-04-29T10:02:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/jp/JVN%2384091359/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/19870"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://securitytracker.com/id?1015986"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/17741"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/1557"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/jp/JVN%2384091359/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/19870"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://securitytracker.com/id?1015986"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/17741"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/1557"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-4644
Vulnerability from fkie_nvd - Published: 2005-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| edgewall_software | trac | 0.9.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AF72084-56B5-4E1B-B701-887984789068",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag."
}
],
"id": "CVE-2005-4644",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://projects.edgewall.com/trac/ticket/2473"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/18465"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/18555"
},
{
"source": "cve@mitre.org",
"url": "http://trac.edgewall.org/ticket/2473"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2006/dsa-951"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/16198"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/0226"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://projects.edgewall.com/trac/ticket/2473"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/18465"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/18555"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://trac.edgewall.org/ticket/2473"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2006/dsa-951"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/16198"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/0226"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-4305
Vulnerability from fkie_nvd - Published: 2005-12-17 00:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| edgewall_software | trac | 0.9 | |
| edgewall_software | trac | 0.9.1 | |
| edgewall_software | trac | 0.9.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "ACF7E7DA-385E-4C8E-90BF-308213EA0550",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C62BB91A-3627-4149-9935-86BB5FF5EE62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AF72084-56B5-4E1B-B701-887984789068",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page."
}
],
"id": "CVE-2005-4305",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-12-17T00:03:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/18048"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/18625"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1015363"
},
{
"source": "cve@mitre.org",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/16386"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2005/2936"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/18048"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/18625"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1015363"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/16386"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2005/2936"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-4065
Vulnerability from fkie_nvd - Published: 2005-12-07 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| edgewall_software | trac | 0.7.1 | |
| edgewall_software | trac | 0.8.1 | |
| edgewall_software | trac | 0.8.3 | |
| edgewall_software | trac | 0.8.4 | |
| edgewall_software | trac | 0.9 | |
| edgewall_software | trac | 0.9.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8DAF74C-8188-4F29-ACDA-ACEE3B02CB24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4A1430A5-5C85-45FF-9E9F-2FEF9EABC603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C70CF2A2-AE61-4A48-B6A7-108358D55A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4BB9D21E-A75E-4B9A-861E-51F8D99463B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "ACF7E7DA-385E-4C8E-90BF-308213EA0550",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C62BB91A-3627-4149-9935-86BB5FF5EE62",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors."
}
],
"id": "CVE-2005-4065",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-12-07T11:03:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
},
{
"source": "cve@mitre.org",
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/17894"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/18555"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/222"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2006/dsa-951"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/21459"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/15720"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2005/2766"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/17894"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/18555"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/222"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2006/dsa-951"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/21459"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/15720"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2005/2766"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-3980
Vulnerability from fkie_nvd - Published: 2005-12-04 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| edgewall_software | trac | 0.5.1 | |
| edgewall_software | trac | 0.5.2 | |
| edgewall_software | trac | 0.6 | |
| edgewall_software | trac | 0.6.1 | |
| edgewall_software | trac | 0.7 | |
| edgewall_software | trac | 0.7.1 | |
| edgewall_software | trac | 0.8 | |
| edgewall_software | trac | 0.8.1 | |
| edgewall_software | trac | 0.8.2 | |
| edgewall_software | trac | 0.8.3 | |
| edgewall_software | trac | 0.8.4 | |
| edgewall_software | trac | 0.9 | |
| edgewall_software | trac | 0.9b1 | |
| edgewall_software | trac | 0.9b2 | |
| edgewall_software | trac | 0.50.9 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5631A575-5CA5-4421-B75A-073DE829E247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "801E19E5-2CE7-41B3-9727-C4F3222BE23B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C0A90354-05CE-44CB-B658-3B80795001BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "91A51BD2-A54A-4D3D-B0DA-57055110BF85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FEEF99-F54D-4542-AF3A-E94D976420A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8DAF74C-8188-4F29-ACDA-ACEE3B02CB24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2FAC175D-2893-45B6-9B4E-AD35571FF08E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4A1430A5-5C85-45FF-9E9F-2FEF9EABC603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94221B90-8F50-426D-87C7-3A1ABABAF354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C70CF2A2-AE61-4A48-B6A7-108358D55A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4BB9D21E-A75E-4B9A-861E-51F8D99463B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "ACF7E7DA-385E-4C8E-90BF-308213EA0550",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9b1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C291732-9D53-4641-BFBB-F9BD5F1D485C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9b2:*:*:*:*:*:*:*",
"matchCriteriaId": "DCE33859-583E-4F06-BC30-37DB4D59F904",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:edgewall_software:trac:0.50.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A8196233-19A2-4617-87A9-12D8DB10D91F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter."
}
],
"id": "CVE-2005-3980",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-12-04T11:03:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/17836/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://securitytracker.com/id?1015302"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/21386"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/15676/"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2005/2701"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/17836/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://securitytracker.com/id?1015302"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/21386"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/15676/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2005/2701"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2008-3328 (GCVE-0-2008-3328)
Vulnerability from cvelistv5 – Published: 2008-07-27 22:00 – Updated: 2024-08-07 09:37
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:37:26.950Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2008-6833",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
},
{
"name": "FEDORA-2008-6830",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
},
{
"name": "30400",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30400"
},
{
"name": "trac-wikiengine-xss(44016)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
},
{
"name": "31231",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31231"
},
{
"name": "31314",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31314"
},
{
"name": "ADV-2008-2223",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2223/references"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-06-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "FEDORA-2008-6833",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
},
{
"name": "FEDORA-2008-6830",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
},
{
"name": "30400",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30400"
},
{
"name": "trac-wikiengine-xss(44016)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
},
{
"name": "31231",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31231"
},
{
"name": "31314",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31314"
},
{
"name": "ADV-2008-2223",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2223/references"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-3328",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2008-6833",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
},
{
"name": "FEDORA-2008-6830",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
},
{
"name": "30400",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30400"
},
{
"name": "trac-wikiengine-xss(44016)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
},
{
"name": "31231",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31231"
},
{
"name": "31314",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31314"
},
{
"name": "ADV-2008-2223",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2223/references"
},
{
"name": "http://trac.edgewall.org/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-3328",
"datePublished": "2008-07-27T22:00:00",
"dateReserved": "2008-07-27T00:00:00",
"dateUpdated": "2024-08-07T09:37:26.950Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-1406 (GCVE-0-2007-1406)
Vulnerability from cvelistv5 – Published: 2007-03-10 22:00 – Updated: 2024-09-16 23:47
VLAI?
Summary
Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain "unsafe" situations, which has unknown impact and remote attack vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:59:06.989Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain \"unsafe\" situations, which has unknown impact and remote attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2007-03-10T22:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1406",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain \"unsafe\" situations, which has unknown impact and remote attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://trac.edgewall.org/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1406",
"datePublished": "2007-03-10T22:00:00Z",
"dateReserved": "2007-03-10T00:00:00Z",
"dateUpdated": "2024-09-16T23:47:02.146Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-1405 (GCVE-0-2007-1405)
Vulnerability from cvelistv5 – Published: 2007-03-10 22:00 – Updated: 2024-08-07 12:59
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the "download wiki page as text" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:59:06.754Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "24470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24470"
},
{
"name": "trac-downloadwikipageastext-xss(32897)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
},
{
"name": "ADV-2007-0900",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0900"
},
{
"name": "22888",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22888"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the \"download wiki page as text\" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "24470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24470"
},
{
"name": "trac-downloadwikipageastext-xss(32897)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
},
{
"name": "ADV-2007-0900",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0900"
},
{
"name": "22888",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22888"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1405",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the \"download wiki page as text\" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "24470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24470"
},
{
"name": "trac-downloadwikipageastext-xss(32897)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
},
{
"name": "ADV-2007-0900",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0900"
},
{
"name": "22888",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22888"
},
{
"name": "http://trac.edgewall.org/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1405",
"datePublished": "2007-03-10T22:00:00",
"dateReserved": "2007-03-10T00:00:00",
"dateUpdated": "2024-08-07T12:59:06.754Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5878 (GCVE-0-2006-5878)
Vulnerability from cvelistv5 – Published: 2006-11-14 19:00 – Updated: 2024-08-07 20:04
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:04:55.766Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "GLSA-200612-14",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
},
{
"name": "22789",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22789"
},
{
"name": "DSA-1209",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2006/dsa-1209"
},
{
"name": "23357",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23357"
},
{
"name": "ADV-2006-4422",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/4422"
},
{
"name": "trac-unspecified-csrf(30146)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
},
{
"name": "22868",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22868"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://trac.edgewall.org/ticket/4049"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-11-08T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "GLSA-200612-14",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
},
{
"name": "22789",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22789"
},
{
"name": "DSA-1209",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2006/dsa-1209"
},
{
"name": "23357",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23357"
},
{
"name": "ADV-2006-4422",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/4422"
},
{
"name": "trac-unspecified-csrf(30146)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
},
{
"name": "22868",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22868"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://trac.edgewall.org/ticket/4049"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5878",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "GLSA-200612-14",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
},
{
"name": "22789",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22789"
},
{
"name": "DSA-1209",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1209"
},
{
"name": "23357",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23357"
},
{
"name": "ADV-2006-4422",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4422"
},
{
"name": "trac-unspecified-csrf(30146)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
},
{
"name": "22868",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22868"
},
{
"name": "http://trac.edgewall.org/ticket/4049",
"refsource": "MISC",
"url": "http://trac.edgewall.org/ticket/4049"
},
{
"name": "http://trac.edgewall.org/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-5878",
"datePublished": "2006-11-14T19:00:00",
"dateReserved": "2006-11-14T00:00:00",
"dateUpdated": "2024-08-07T20:04:55.766Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-3695 (GCVE-0-2006-3695)
Vulnerability from cvelistv5 – Published: 2006-07-19 01:00 – Updated: 2024-08-07 18:39
VLAI?
Summary
Trac before 0.9.6 does not disable the "raw" or "include" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:39:53.571Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "trac-restructuredtext-obtain-information(27706)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
},
{
"name": "ADV-2006-2729",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/2729"
},
{
"name": "20958",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/20958"
},
{
"name": "1016457",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016457"
},
{
"name": "18323",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/18323"
},
{
"name": "trac-restructuredtext-dos(27708)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
},
{
"name": "DSA-1152",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2006/dsa-1152"
},
{
"name": "21534",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21534"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-07-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Trac before 0.9.6 does not disable the \"raw\" or \"include\" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "trac-restructuredtext-obtain-information(27706)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
},
{
"name": "ADV-2006-2729",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/2729"
},
{
"name": "20958",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/20958"
},
{
"name": "1016457",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016457"
},
{
"name": "18323",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/18323"
},
{
"name": "trac-restructuredtext-dos(27708)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
},
{
"name": "DSA-1152",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2006/dsa-1152"
},
{
"name": "21534",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21534"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-3695",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Trac before 0.9.6 does not disable the \"raw\" or \"include\" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "trac-restructuredtext-obtain-information(27706)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
},
{
"name": "ADV-2006-2729",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2729"
},
{
"name": "20958",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20958"
},
{
"name": "1016457",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016457"
},
{
"name": "18323",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18323"
},
{
"name": "trac-restructuredtext-dos(27708)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
},
{
"name": "DSA-1152",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1152"
},
{
"name": "21534",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21534"
},
{
"name": "http://trac.edgewall.org/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-3695",
"datePublished": "2006-07-19T01:00:00",
"dateReserved": "2006-07-18T00:00:00",
"dateUpdated": "2024-08-07T18:39:53.571Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-2106 (GCVE-0-2006-2106)
Vulnerability from cvelistv5 – Published: 2006-04-29 10:00 – Updated: 2024-08-07 17:35
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a "wiki macro."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T17:35:31.382Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "19870",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19870"
},
{
"name": "JVN#84091359",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/jp/JVN%2384091359/index.html"
},
{
"name": "trac-wiki-engine-xss(26125)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
},
{
"name": "ADV-2006-1557",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/1557"
},
{
"name": "1015986",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015986"
},
{
"name": "17741",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/17741"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-04-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a \"wiki macro.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "19870",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19870"
},
{
"name": "JVN#84091359",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/jp/JVN%2384091359/index.html"
},
{
"name": "trac-wiki-engine-xss(26125)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
},
{
"name": "ADV-2006-1557",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/1557"
},
{
"name": "1015986",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015986"
},
{
"name": "17741",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/17741"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-2106",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a \"wiki macro.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "19870",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19870"
},
{
"name": "JVN#84091359",
"refsource": "JVN",
"url": "http://jvn.jp/jp/JVN%2384091359/index.html"
},
{
"name": "trac-wiki-engine-xss(26125)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
},
{
"name": "http://www.edgewall.com/blog/news/trac_0_9_5.html",
"refsource": "CONFIRM",
"url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
},
{
"name": "ADV-2006-1557",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1557"
},
{
"name": "1015986",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015986"
},
{
"name": "17741",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17741"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-2106",
"datePublished": "2006-04-29T10:00:00",
"dateReserved": "2006-04-29T00:00:00",
"dateUpdated": "2024-08-07T17:35:31.382Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-4644 (GCVE-0-2005-4644)
Vulnerability from cvelistv5 – Published: 2006-01-11 21:00 – Updated: 2024-08-07 23:53
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:53:28.548Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "18555",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18555"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.edgewall.org/ticket/2473"
},
{
"name": "trac-html-xss(24183)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
},
{
"name": "18465",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18465"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://projects.edgewall.com/trac/ticket/2473"
},
{
"name": "ADV-2006-0226",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/0226"
},
{
"name": "16198",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16198"
},
{
"name": "DSA-951",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2006/dsa-951"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "18555",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18555"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.edgewall.org/ticket/2473"
},
{
"name": "trac-html-xss(24183)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
},
{
"name": "18465",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18465"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://projects.edgewall.com/trac/ticket/2473"
},
{
"name": "ADV-2006-0226",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/0226"
},
{
"name": "16198",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16198"
},
{
"name": "DSA-951",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2006/dsa-951"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4644",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "18555",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18555"
},
{
"name": "http://trac.edgewall.org/ticket/2473",
"refsource": "CONFIRM",
"url": "http://trac.edgewall.org/ticket/2473"
},
{
"name": "trac-html-xss(24183)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
},
{
"name": "18465",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18465"
},
{
"name": "http://projects.edgewall.com/trac/ticket/2473",
"refsource": "CONFIRM",
"url": "http://projects.edgewall.com/trac/ticket/2473"
},
{
"name": "ADV-2006-0226",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0226"
},
{
"name": "16198",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16198"
},
{
"name": "DSA-951",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-951"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-4644",
"datePublished": "2006-01-11T21:00:00",
"dateReserved": "2006-01-11T00:00:00",
"dateUpdated": "2024-08-07T23:53:28.548Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-4305 (GCVE-0-2005-4305)
Vulnerability from cvelistv5 – Published: 2005-12-17 00:00 – Updated: 2024-08-07 23:38
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:38:51.647Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "GLSA-200601-12",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
},
{
"name": "1015363",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015363"
},
{
"name": "ADV-2005-2936",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2005/2936"
},
{
"name": "16386",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16386"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "trac-url-path-xss(23775)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
},
{
"name": "18048",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18048"
},
{
"name": "18625",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18625"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "GLSA-200601-12",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
},
{
"name": "1015363",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015363"
},
{
"name": "ADV-2005-2936",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2005/2936"
},
{
"name": "16386",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16386"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "trac-url-path-xss(23775)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
},
{
"name": "18048",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18048"
},
{
"name": "18625",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18625"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4305",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "GLSA-200601-12",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
},
{
"name": "1015363",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015363"
},
{
"name": "ADV-2005-2936",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2936"
},
{
"name": "16386",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16386"
},
{
"name": "http://projects.edgewall.com/trac/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "trac-url-path-xss(23775)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
},
{
"name": "18048",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18048"
},
{
"name": "18625",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18625"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-4305",
"datePublished": "2005-12-17T00:00:00",
"dateReserved": "2005-12-16T00:00:00",
"dateUpdated": "2024-08-07T23:38:51.647Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-4065 (GCVE-0-2005-4065)
Vulnerability from cvelistv5 – Published: 2005-12-07 11:00 – Updated: 2024-08-07 23:31
VLAI?
Summary
SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:31:48.938Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "18555",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18555"
},
{
"name": "21459",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/21459"
},
{
"name": "[Trac] 20051205 SECURITY: Trac 0.9.2 Released",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
},
{
"name": "222",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/222"
},
{
"name": "17894",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/17894"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "ADV-2005-2766",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2005/2766"
},
{
"name": "DSA-951",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2006/dsa-951"
},
{
"name": "15720",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15720"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-12-12T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "18555",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18555"
},
{
"name": "21459",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/21459"
},
{
"name": "[Trac] 20051205 SECURITY: Trac 0.9.2 Released",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
},
{
"name": "222",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/222"
},
{
"name": "17894",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/17894"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "ADV-2005-2766",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2005/2766"
},
{
"name": "DSA-951",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2006/dsa-951"
},
{
"name": "15720",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15720"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4065",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "18555",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18555"
},
{
"name": "21459",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21459"
},
{
"name": "[Trac] 20051205 SECURITY: Trac 0.9.2 Released",
"refsource": "MLIST",
"url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
},
{
"name": "222",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/222"
},
{
"name": "17894",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17894"
},
{
"name": "http://projects.edgewall.com/trac/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "ADV-2005-2766",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2766"
},
{
"name": "DSA-951",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-951"
},
{
"name": "15720",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15720"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-4065",
"datePublished": "2005-12-07T11:00:00",
"dateReserved": "2005-12-07T00:00:00",
"dateUpdated": "2024-08-07T23:31:48.938Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-3980 (GCVE-0-2005-3980)
Vulnerability from cvelistv5 – Published: 2005-12-04 11:00 – Updated: 2024-08-07 23:31
VLAI?
Summary
SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:31:48.901Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20051201 Edgewall Trac SQL Injection Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
},
{
"name": "21386",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/21386"
},
{
"name": "17836",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/17836/"
},
{
"name": "ADV-2005-2701",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2005/2701"
},
{
"name": "15676",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15676/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "1015302",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015302"
},
{
"name": "trac-query-sql-injection(23461)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-19T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20051201 Edgewall Trac SQL Injection Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
},
{
"name": "21386",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/21386"
},
{
"name": "17836",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/17836/"
},
{
"name": "ADV-2005-2701",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2005/2701"
},
{
"name": "15676",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15676/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "1015302",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015302"
},
{
"name": "trac-query-sql-injection(23461)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-3980",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20051201 Edgewall Trac SQL Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
},
{
"name": "21386",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21386"
},
{
"name": "17836",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17836/"
},
{
"name": "ADV-2005-2701",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2701"
},
{
"name": "15676",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15676/"
},
{
"name": "http://projects.edgewall.com/trac/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "1015302",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015302"
},
{
"name": "trac-query-sql-injection(23461)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-3980",
"datePublished": "2005-12-04T11:00:00",
"dateReserved": "2005-12-04T00:00:00",
"dateUpdated": "2024-08-07T23:31:48.901Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-3328 (GCVE-0-2008-3328)
Vulnerability from nvd – Published: 2008-07-27 22:00 – Updated: 2024-08-07 09:37
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:37:26.950Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2008-6833",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
},
{
"name": "FEDORA-2008-6830",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
},
{
"name": "30400",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30400"
},
{
"name": "trac-wikiengine-xss(44016)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
},
{
"name": "31231",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31231"
},
{
"name": "31314",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31314"
},
{
"name": "ADV-2008-2223",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2223/references"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-06-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "FEDORA-2008-6833",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
},
{
"name": "FEDORA-2008-6830",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
},
{
"name": "30400",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30400"
},
{
"name": "trac-wikiengine-xss(44016)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
},
{
"name": "31231",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31231"
},
{
"name": "31314",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31314"
},
{
"name": "ADV-2008-2223",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2223/references"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-3328",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2008-6833",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
},
{
"name": "FEDORA-2008-6830",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
},
{
"name": "30400",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30400"
},
{
"name": "trac-wikiengine-xss(44016)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
},
{
"name": "31231",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31231"
},
{
"name": "31314",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31314"
},
{
"name": "ADV-2008-2223",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2223/references"
},
{
"name": "http://trac.edgewall.org/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-3328",
"datePublished": "2008-07-27T22:00:00",
"dateReserved": "2008-07-27T00:00:00",
"dateUpdated": "2024-08-07T09:37:26.950Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-1406 (GCVE-0-2007-1406)
Vulnerability from nvd – Published: 2007-03-10 22:00 – Updated: 2024-09-16 23:47
VLAI?
Summary
Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain "unsafe" situations, which has unknown impact and remote attack vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:59:06.989Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain \"unsafe\" situations, which has unknown impact and remote attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2007-03-10T22:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1406",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain \"unsafe\" situations, which has unknown impact and remote attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://trac.edgewall.org/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1406",
"datePublished": "2007-03-10T22:00:00Z",
"dateReserved": "2007-03-10T00:00:00Z",
"dateUpdated": "2024-09-16T23:47:02.146Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-1405 (GCVE-0-2007-1405)
Vulnerability from nvd – Published: 2007-03-10 22:00 – Updated: 2024-08-07 12:59
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the "download wiki page as text" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:59:06.754Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "24470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24470"
},
{
"name": "trac-downloadwikipageastext-xss(32897)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
},
{
"name": "ADV-2007-0900",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0900"
},
{
"name": "22888",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22888"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the \"download wiki page as text\" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "24470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24470"
},
{
"name": "trac-downloadwikipageastext-xss(32897)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
},
{
"name": "ADV-2007-0900",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0900"
},
{
"name": "22888",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22888"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1405",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the \"download wiki page as text\" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "24470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24470"
},
{
"name": "trac-downloadwikipageastext-xss(32897)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
},
{
"name": "ADV-2007-0900",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0900"
},
{
"name": "22888",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22888"
},
{
"name": "http://trac.edgewall.org/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1405",
"datePublished": "2007-03-10T22:00:00",
"dateReserved": "2007-03-10T00:00:00",
"dateUpdated": "2024-08-07T12:59:06.754Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5878 (GCVE-0-2006-5878)
Vulnerability from nvd – Published: 2006-11-14 19:00 – Updated: 2024-08-07 20:04
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:04:55.766Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "GLSA-200612-14",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
},
{
"name": "22789",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22789"
},
{
"name": "DSA-1209",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2006/dsa-1209"
},
{
"name": "23357",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23357"
},
{
"name": "ADV-2006-4422",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/4422"
},
{
"name": "trac-unspecified-csrf(30146)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
},
{
"name": "22868",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22868"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://trac.edgewall.org/ticket/4049"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-11-08T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "GLSA-200612-14",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
},
{
"name": "22789",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22789"
},
{
"name": "DSA-1209",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2006/dsa-1209"
},
{
"name": "23357",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23357"
},
{
"name": "ADV-2006-4422",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/4422"
},
{
"name": "trac-unspecified-csrf(30146)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
},
{
"name": "22868",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22868"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://trac.edgewall.org/ticket/4049"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5878",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "GLSA-200612-14",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
},
{
"name": "22789",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22789"
},
{
"name": "DSA-1209",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1209"
},
{
"name": "23357",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23357"
},
{
"name": "ADV-2006-4422",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4422"
},
{
"name": "trac-unspecified-csrf(30146)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
},
{
"name": "22868",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22868"
},
{
"name": "http://trac.edgewall.org/ticket/4049",
"refsource": "MISC",
"url": "http://trac.edgewall.org/ticket/4049"
},
{
"name": "http://trac.edgewall.org/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-5878",
"datePublished": "2006-11-14T19:00:00",
"dateReserved": "2006-11-14T00:00:00",
"dateUpdated": "2024-08-07T20:04:55.766Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-3695 (GCVE-0-2006-3695)
Vulnerability from nvd – Published: 2006-07-19 01:00 – Updated: 2024-08-07 18:39
VLAI?
Summary
Trac before 0.9.6 does not disable the "raw" or "include" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:39:53.571Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "trac-restructuredtext-obtain-information(27706)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
},
{
"name": "ADV-2006-2729",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/2729"
},
{
"name": "20958",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/20958"
},
{
"name": "1016457",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016457"
},
{
"name": "18323",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/18323"
},
{
"name": "trac-restructuredtext-dos(27708)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
},
{
"name": "DSA-1152",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2006/dsa-1152"
},
{
"name": "21534",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21534"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-07-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Trac before 0.9.6 does not disable the \"raw\" or \"include\" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "trac-restructuredtext-obtain-information(27706)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
},
{
"name": "ADV-2006-2729",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/2729"
},
{
"name": "20958",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/20958"
},
{
"name": "1016457",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016457"
},
{
"name": "18323",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/18323"
},
{
"name": "trac-restructuredtext-dos(27708)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
},
{
"name": "DSA-1152",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2006/dsa-1152"
},
{
"name": "21534",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21534"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-3695",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Trac before 0.9.6 does not disable the \"raw\" or \"include\" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "trac-restructuredtext-obtain-information(27706)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
},
{
"name": "ADV-2006-2729",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2729"
},
{
"name": "20958",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20958"
},
{
"name": "1016457",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016457"
},
{
"name": "18323",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18323"
},
{
"name": "trac-restructuredtext-dos(27708)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
},
{
"name": "DSA-1152",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1152"
},
{
"name": "21534",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21534"
},
{
"name": "http://trac.edgewall.org/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://trac.edgewall.org/wiki/ChangeLog"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-3695",
"datePublished": "2006-07-19T01:00:00",
"dateReserved": "2006-07-18T00:00:00",
"dateUpdated": "2024-08-07T18:39:53.571Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-2106 (GCVE-0-2006-2106)
Vulnerability from nvd – Published: 2006-04-29 10:00 – Updated: 2024-08-07 17:35
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a "wiki macro."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T17:35:31.382Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "19870",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19870"
},
{
"name": "JVN#84091359",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/jp/JVN%2384091359/index.html"
},
{
"name": "trac-wiki-engine-xss(26125)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
},
{
"name": "ADV-2006-1557",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/1557"
},
{
"name": "1015986",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015986"
},
{
"name": "17741",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/17741"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-04-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a \"wiki macro.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "19870",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19870"
},
{
"name": "JVN#84091359",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/jp/JVN%2384091359/index.html"
},
{
"name": "trac-wiki-engine-xss(26125)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
},
{
"name": "ADV-2006-1557",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/1557"
},
{
"name": "1015986",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015986"
},
{
"name": "17741",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/17741"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-2106",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a \"wiki macro.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "19870",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19870"
},
{
"name": "JVN#84091359",
"refsource": "JVN",
"url": "http://jvn.jp/jp/JVN%2384091359/index.html"
},
{
"name": "trac-wiki-engine-xss(26125)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
},
{
"name": "http://www.edgewall.com/blog/news/trac_0_9_5.html",
"refsource": "CONFIRM",
"url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
},
{
"name": "ADV-2006-1557",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1557"
},
{
"name": "1015986",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015986"
},
{
"name": "17741",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17741"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-2106",
"datePublished": "2006-04-29T10:00:00",
"dateReserved": "2006-04-29T00:00:00",
"dateUpdated": "2024-08-07T17:35:31.382Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-4644 (GCVE-0-2005-4644)
Vulnerability from nvd – Published: 2006-01-11 21:00 – Updated: 2024-08-07 23:53
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:53:28.548Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "18555",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18555"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.edgewall.org/ticket/2473"
},
{
"name": "trac-html-xss(24183)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
},
{
"name": "18465",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18465"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://projects.edgewall.com/trac/ticket/2473"
},
{
"name": "ADV-2006-0226",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/0226"
},
{
"name": "16198",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16198"
},
{
"name": "DSA-951",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2006/dsa-951"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "18555",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18555"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.edgewall.org/ticket/2473"
},
{
"name": "trac-html-xss(24183)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
},
{
"name": "18465",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18465"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://projects.edgewall.com/trac/ticket/2473"
},
{
"name": "ADV-2006-0226",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/0226"
},
{
"name": "16198",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16198"
},
{
"name": "DSA-951",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2006/dsa-951"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4644",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "18555",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18555"
},
{
"name": "http://trac.edgewall.org/ticket/2473",
"refsource": "CONFIRM",
"url": "http://trac.edgewall.org/ticket/2473"
},
{
"name": "trac-html-xss(24183)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
},
{
"name": "18465",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18465"
},
{
"name": "http://projects.edgewall.com/trac/ticket/2473",
"refsource": "CONFIRM",
"url": "http://projects.edgewall.com/trac/ticket/2473"
},
{
"name": "ADV-2006-0226",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0226"
},
{
"name": "16198",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16198"
},
{
"name": "DSA-951",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-951"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-4644",
"datePublished": "2006-01-11T21:00:00",
"dateReserved": "2006-01-11T00:00:00",
"dateUpdated": "2024-08-07T23:53:28.548Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-4305 (GCVE-0-2005-4305)
Vulnerability from nvd – Published: 2005-12-17 00:00 – Updated: 2024-08-07 23:38
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:38:51.647Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "GLSA-200601-12",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
},
{
"name": "1015363",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015363"
},
{
"name": "ADV-2005-2936",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2005/2936"
},
{
"name": "16386",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16386"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "trac-url-path-xss(23775)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
},
{
"name": "18048",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18048"
},
{
"name": "18625",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18625"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "GLSA-200601-12",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
},
{
"name": "1015363",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015363"
},
{
"name": "ADV-2005-2936",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2005/2936"
},
{
"name": "16386",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16386"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "trac-url-path-xss(23775)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
},
{
"name": "18048",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18048"
},
{
"name": "18625",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18625"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4305",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "GLSA-200601-12",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
},
{
"name": "1015363",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015363"
},
{
"name": "ADV-2005-2936",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2936"
},
{
"name": "16386",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16386"
},
{
"name": "http://projects.edgewall.com/trac/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "trac-url-path-xss(23775)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
},
{
"name": "18048",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18048"
},
{
"name": "18625",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18625"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-4305",
"datePublished": "2005-12-17T00:00:00",
"dateReserved": "2005-12-16T00:00:00",
"dateUpdated": "2024-08-07T23:38:51.647Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-4065 (GCVE-0-2005-4065)
Vulnerability from nvd – Published: 2005-12-07 11:00 – Updated: 2024-08-07 23:31
VLAI?
Summary
SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:31:48.938Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "18555",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18555"
},
{
"name": "21459",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/21459"
},
{
"name": "[Trac] 20051205 SECURITY: Trac 0.9.2 Released",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
},
{
"name": "222",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/222"
},
{
"name": "17894",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/17894"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "ADV-2005-2766",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2005/2766"
},
{
"name": "DSA-951",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2006/dsa-951"
},
{
"name": "15720",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15720"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-12-12T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "18555",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18555"
},
{
"name": "21459",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/21459"
},
{
"name": "[Trac] 20051205 SECURITY: Trac 0.9.2 Released",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
},
{
"name": "222",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/222"
},
{
"name": "17894",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/17894"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "ADV-2005-2766",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2005/2766"
},
{
"name": "DSA-951",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2006/dsa-951"
},
{
"name": "15720",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15720"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4065",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "18555",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18555"
},
{
"name": "21459",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21459"
},
{
"name": "[Trac] 20051205 SECURITY: Trac 0.9.2 Released",
"refsource": "MLIST",
"url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
},
{
"name": "222",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/222"
},
{
"name": "17894",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17894"
},
{
"name": "http://projects.edgewall.com/trac/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "ADV-2005-2766",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2766"
},
{
"name": "DSA-951",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-951"
},
{
"name": "15720",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15720"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-4065",
"datePublished": "2005-12-07T11:00:00",
"dateReserved": "2005-12-07T00:00:00",
"dateUpdated": "2024-08-07T23:31:48.938Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-3980 (GCVE-0-2005-3980)
Vulnerability from nvd – Published: 2005-12-04 11:00 – Updated: 2024-08-07 23:31
VLAI?
Summary
SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:31:48.901Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20051201 Edgewall Trac SQL Injection Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
},
{
"name": "21386",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/21386"
},
{
"name": "17836",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/17836/"
},
{
"name": "ADV-2005-2701",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2005/2701"
},
{
"name": "15676",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15676/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "1015302",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015302"
},
{
"name": "trac-query-sql-injection(23461)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-19T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20051201 Edgewall Trac SQL Injection Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
},
{
"name": "21386",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/21386"
},
{
"name": "17836",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/17836/"
},
{
"name": "ADV-2005-2701",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2005/2701"
},
{
"name": "15676",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15676/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "1015302",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015302"
},
{
"name": "trac-query-sql-injection(23461)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-3980",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20051201 Edgewall Trac SQL Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
},
{
"name": "21386",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21386"
},
{
"name": "17836",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17836/"
},
{
"name": "ADV-2005-2701",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2701"
},
{
"name": "15676",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15676/"
},
{
"name": "http://projects.edgewall.com/trac/wiki/ChangeLog",
"refsource": "CONFIRM",
"url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
},
{
"name": "1015302",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015302"
},
{
"name": "trac-query-sql-injection(23461)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-3980",
"datePublished": "2005-12-04T11:00:00",
"dateReserved": "2005-12-04T00:00:00",
"dateUpdated": "2024-08-07T23:31:48.901Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}