Search criteria

36 vulnerabilities found for trac by edgewall_software

FKIE_CVE-2008-3328

Vulnerability from fkie_nvd - Published: 2008-07-27 22:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E3F59DB-563B-40B4-84A5-6264B189D43D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "27CD4ECA-7609-446F-A3FB-3E6ACA42ABC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5631A575-5CA5-4421-B75A-073DE829E247",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "801E19E5-2CE7-41B3-9727-C4F3222BE23B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0A90354-05CE-44CB-B658-3B80795001BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A51BD2-A54A-4D3D-B0DA-57055110BF85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FEEF99-F54D-4542-AF3A-E94D976420A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8DAF74C-8188-4F29-ACDA-ACEE3B02CB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FAC175D-2893-45B6-9B4E-AD35571FF08E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A1430A5-5C85-45FF-9E9F-2FEF9EABC603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "94221B90-8F50-426D-87C7-3A1ABABAF354",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C70CF2A2-AE61-4A48-B6A7-108358D55A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BB9D21E-A75E-4B9A-861E-51F8D99463B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF7E7DA-385E-4C8E-90BF-308213EA0550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62BB91A-3627-4149-9935-86BB5FF5EE62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF72084-56B5-4E1B-B701-887984789068",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "354FEA3C-9626-4DD1-ADCA-F94F616C6972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BF7DA3-8B16-4883-9184-817E85B04395",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEF7CA9C-2312-405F-8497-E05AB8383976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F2E7FF-B518-4217-A28A-0A8F03CE6B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C291732-9D53-4641-BFBB-F9BD5F1D485C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCE33859-583E-4F06-BC30-37DB4D59F904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "380AFEFF-64A3-43A7-8EBB-88829039A9EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "541460F8-30BC-40B3-ADE7-A0C8FAC7C34E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "393BF6C4-B455-4DDE-9A29-794AF3900F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DF703B1-B485-4D16-90C9-820A2780AE2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.10.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DFB2875-DF31-4B5C-BFCF-111E028A50B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.50.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8196233-19A2-4617-87A9-12D8DB10D91F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en el Motor del wiki en Trac anterior a 0.10.5, permite a atacantes remotos inyectar secuencias de comandos web y HTML de su elecci\u00f3n a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2008-3328",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-07-27T22:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31231"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31314"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.edgewall.org/wiki/ChangeLog"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30400"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2223/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31231"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31314"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.edgewall.org/wiki/ChangeLog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30400"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2223/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-1405

Vulnerability from fkie_nvd - Published: 2007-03-10 22:19 - Updated: 2025-04-09 00:30

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "380AFEFF-64A3-43A7-8EBB-88829039A9EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "541460F8-30BC-40B3-ADE7-A0C8FAC7C34E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "393BF6C4-B455-4DDE-9A29-794AF3900F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DF703B1-B485-4D16-90C9-820A2780AE2C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the \"download wiki page as text\" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en la caracter\u00edstica \"descargar wiki como p\u00e1gina de texto\" en Trac anterior a 0.10.3.1, cuando se utiliza Microsoft Internet Explorer, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de par\u00e1metros no especificados."
    }
  ],
  "id": "CVE-2007-1405",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-03-10T22:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24470"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://trac.edgewall.org/wiki/ChangeLog"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/22888"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/0900"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24470"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://trac.edgewall.org/wiki/ChangeLog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/22888"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0900"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-1406

Vulnerability from fkie_nvd - Published: 2007-03-10 22:19 - Updated: 2025-04-09 00:30
Severity ?
Summary
Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain "unsafe" situations, which has unknown impact and remote attack vectors.
Impacted products
Vendor Product Version
edgewall_software trac 0.10
edgewall_software trac 0.10.1
edgewall_software trac 0.10.2
edgewall_software trac 0.10.3

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "380AFEFF-64A3-43A7-8EBB-88829039A9EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "541460F8-30BC-40B3-ADE7-A0C8FAC7C34E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "393BF6C4-B455-4DDE-9A29-794AF3900F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DF703B1-B485-4D16-90C9-820A2780AE2C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain \"unsafe\" situations, which has unknown impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "Trac anterior a 0.10.3.1 no env\u00eda una cabecera de disposici\u00f3n de contenido HTTP especificando un adjunto en ciertas situaciones \"no seguras\", lo cual tiene un impacto desconocido y vectores de ataque remotos."
    }
  ],
  "evaluatorComment": "This vulnerability has been addressed by the following vendor update:\r\nhttp://trac.edgewall.org/wiki/TracDownload",
  "id": "CVE-2007-1406",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-03-10T22:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://trac.edgewall.org/wiki/ChangeLog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.edgewall.org/wiki/ChangeLog"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-5878

Vulnerability from fkie_nvd - Published: 2006-11-14 19:07 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D865B6A-E912-4BCA-9514-047054EA22AC",
              "versionEndIncluding": "0.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "27CD4ECA-7609-446F-A3FB-3E6ACA42ABC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5631A575-5CA5-4421-B75A-073DE829E247",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "801E19E5-2CE7-41B3-9727-C4F3222BE23B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0A90354-05CE-44CB-B658-3B80795001BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A51BD2-A54A-4D3D-B0DA-57055110BF85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FEEF99-F54D-4542-AF3A-E94D976420A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8DAF74C-8188-4F29-ACDA-ACEE3B02CB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FAC175D-2893-45B6-9B4E-AD35571FF08E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A1430A5-5C85-45FF-9E9F-2FEF9EABC603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "94221B90-8F50-426D-87C7-3A1ABABAF354",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C70CF2A2-AE61-4A48-B6A7-108358D55A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BB9D21E-A75E-4B9A-861E-51F8D99463B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF7E7DA-385E-4C8E-90BF-308213EA0550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62BB91A-3627-4149-9935-86BB5FF5EE62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF72084-56B5-4E1B-B701-887984789068",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "354FEA3C-9626-4DD1-ADCA-F94F616C6972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BF7DA3-8B16-4883-9184-817E85B04395",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEF7CA9C-2312-405F-8497-E05AB8383976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F2E7FF-B518-4217-A28A-0A8F03CE6B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C291732-9D53-4641-BFBB-F9BD5F1D485C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCE33859-583E-4F06-BC30-37DB4D59F904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.50.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8196233-19A2-4617-87A9-12D8DB10D91F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en Edgewall Trac 0.10 y anteriores permite a atacantes remotos realizar acciones no autorizadas como otros usuarios mediante vectores desconocidos."
    }
  ],
  "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nEdgewall Software, Trac, 0.10.1",
  "id": "CVE-2006-5878",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-11-14T19:07:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22789"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22868"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23357"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.edgewall.org/ticket/4049"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://trac.edgewall.org/wiki/ChangeLog"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2006/dsa-1209"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/4422"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22868"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23357"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.edgewall.org/ticket/4049"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://trac.edgewall.org/wiki/ChangeLog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2006/dsa-1209"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/4422"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-3695

Vulnerability from fkie_nvd - Published: 2006-07-21 14:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Trac before 0.9.6 does not disable the "raw" or "include" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458.
Impacted products
Vendor Product Version
edgewall_software trac *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC0F377-A06F-42B8-ACDF-EB59F0C912F7",
              "versionEndIncluding": "0.9.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Trac before 0.9.6 does not disable the \"raw\" or \"include\" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458."
    },
    {
      "lang": "es",
      "value": "Trac anterior a 0.9.6 no deshabilita los comandos \"raw\" o \"nclude\" cuando se mantiene a usuarios no v\u00e1lidos con la funcionalidad de texto reestructurado (reStructuredText) desde docutils, lo cual permite a atacantes remotos leer archivos de su elecci\u00f3n, realizando ataques de secuencias de comandos en sitios cruzados (XSS), o provocar denegaci\u00f3n de servicio a trav\u00e9s de vectores no especificados. NOTA: esto podr\u00eda estar relacionado con CVE-2006-3458."
    }
  ],
  "evaluatorSolution": "Upgrade to 0.9.6",
  "id": "CVE-2006-3695",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-07-21T14:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20958"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21534"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016457"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.edgewall.org/wiki/ChangeLog"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1152"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/18323"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/2729"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20958"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21534"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016457"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.edgewall.org/wiki/ChangeLog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/18323"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/2729"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-2106

Vulnerability from fkie_nvd - Published: 2006-04-29 10:02 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BF7DA3-8B16-4883-9184-817E85B04395",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a \"wiki macro.\""
    }
  ],
  "id": "CVE-2006-2106",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-04-29T10:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/jp/JVN%2384091359/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19870"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1015986"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/17741"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1557"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/jp/JVN%2384091359/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19870"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1015986"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/17741"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1557"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-4644

Vulnerability from fkie_nvd - Published: 2005-12-31 05:00 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF72084-56B5-4E1B-B701-887984789068",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag."
    }
  ],
  "id": "CVE-2005-4644",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://projects.edgewall.com/trac/ticket/2473"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18465"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18555"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.edgewall.org/ticket/2473"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-951"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/16198"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/0226"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://projects.edgewall.com/trac/ticket/2473"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18555"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.edgewall.org/ticket/2473"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-951"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/16198"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/0226"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-4305

Vulnerability from fkie_nvd - Published: 2005-12-17 00:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page.
Impacted products
Vendor Product Version
edgewall_software trac 0.9
edgewall_software trac 0.9.1
edgewall_software trac 0.9.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF7E7DA-385E-4C8E-90BF-308213EA0550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62BB91A-3627-4149-9935-86BB5FF5EE62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF72084-56B5-4E1B-B701-887984789068",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page."
    }
  ],
  "id": "CVE-2005-4305",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-17T00:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18048"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18625"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015363"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/16386"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2936"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18048"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18625"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015363"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/16386"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-4065

Vulnerability from fkie_nvd - Published: 2005-12-07 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8DAF74C-8188-4F29-ACDA-ACEE3B02CB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A1430A5-5C85-45FF-9E9F-2FEF9EABC603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C70CF2A2-AE61-4A48-B6A7-108358D55A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BB9D21E-A75E-4B9A-861E-51F8D99463B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF7E7DA-385E-4C8E-90BF-308213EA0550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62BB91A-3627-4149-9935-86BB5FF5EE62",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors."
    }
  ],
  "id": "CVE-2005-4065",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-07T11:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17894"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18555"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-951"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/21459"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/15720"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17894"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18555"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-951"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/21459"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/15720"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2766"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-3980

Vulnerability from fkie_nvd - Published: 2005-12-04 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5631A575-5CA5-4421-B75A-073DE829E247",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "801E19E5-2CE7-41B3-9727-C4F3222BE23B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0A90354-05CE-44CB-B658-3B80795001BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A51BD2-A54A-4D3D-B0DA-57055110BF85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FEEF99-F54D-4542-AF3A-E94D976420A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8DAF74C-8188-4F29-ACDA-ACEE3B02CB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FAC175D-2893-45B6-9B4E-AD35571FF08E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A1430A5-5C85-45FF-9E9F-2FEF9EABC603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "94221B90-8F50-426D-87C7-3A1ABABAF354",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C70CF2A2-AE61-4A48-B6A7-108358D55A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BB9D21E-A75E-4B9A-861E-51F8D99463B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF7E7DA-385E-4C8E-90BF-308213EA0550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C291732-9D53-4641-BFBB-F9BD5F1D485C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.9b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCE33859-583E-4F06-BC30-37DB4D59F904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall_software:trac:0.50.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8196233-19A2-4617-87A9-12D8DB10D91F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter."
    }
  ],
  "id": "CVE-2005-3980",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-04T11:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17836/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1015302"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/21386"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/15676/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2701"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17836/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1015302"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/21386"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/15676/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2701"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2008-3328 (GCVE-0-2008-3328)

Vulnerability from cvelistv5 – Published: 2008-07-27 22:00 – Updated: 2024-08-07 09:37
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.securityfocus.com/bid/30400 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/31231 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/31314 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2223… vdb-entryx_refsource_VUPEN
http://trac.edgewall.org/wiki/ChangeLog x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:37:26.950Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2008-6833",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
          },
          {
            "name": "FEDORA-2008-6830",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
          },
          {
            "name": "30400",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30400"
          },
          {
            "name": "trac-wikiengine-xss(44016)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
          },
          {
            "name": "31231",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31231"
          },
          {
            "name": "31314",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31314"
          },
          {
            "name": "ADV-2008-2223",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2223/references"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.edgewall.org/wiki/ChangeLog"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "FEDORA-2008-6833",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
        },
        {
          "name": "FEDORA-2008-6830",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
        },
        {
          "name": "30400",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30400"
        },
        {
          "name": "trac-wikiengine-xss(44016)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
        },
        {
          "name": "31231",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31231"
        },
        {
          "name": "31314",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31314"
        },
        {
          "name": "ADV-2008-2223",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2223/references"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.edgewall.org/wiki/ChangeLog"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3328",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2008-6833",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
            },
            {
              "name": "FEDORA-2008-6830",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
            },
            {
              "name": "30400",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30400"
            },
            {
              "name": "trac-wikiengine-xss(44016)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
            },
            {
              "name": "31231",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31231"
            },
            {
              "name": "31314",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31314"
            },
            {
              "name": "ADV-2008-2223",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2223/references"
            },
            {
              "name": "http://trac.edgewall.org/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://trac.edgewall.org/wiki/ChangeLog"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3328",
    "datePublished": "2008-07-27T22:00:00",
    "dateReserved": "2008-07-27T00:00:00",
    "dateUpdated": "2024-08-07T09:37:26.950Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-1406 (GCVE-0-2007-1406)

Vulnerability from cvelistv5 – Published: 2007-03-10 22:00 – Updated: 2024-09-16 23:47
VLAI?
Summary
Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain "unsafe" situations, which has unknown impact and remote attack vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:59:06.989Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.edgewall.org/wiki/ChangeLog"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain \"unsafe\" situations, which has unknown impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-03-10T22:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.edgewall.org/wiki/ChangeLog"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1406",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain \"unsafe\" situations, which has unknown impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://trac.edgewall.org/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://trac.edgewall.org/wiki/ChangeLog"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1406",
    "datePublished": "2007-03-10T22:00:00Z",
    "dateReserved": "2007-03-10T00:00:00Z",
    "dateUpdated": "2024-09-16T23:47:02.146Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-1405 (GCVE-0-2007-1405)

Vulnerability from cvelistv5 – Published: 2007-03-10 22:00 – Updated: 2024-08-07 12:59
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the "download wiki page as text" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/24470 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.vupen.com/english/advisories/2007/0900 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/22888 vdb-entryx_refsource_BID
http://trac.edgewall.org/wiki/ChangeLog x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:59:06.754Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "24470",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24470"
          },
          {
            "name": "trac-downloadwikipageastext-xss(32897)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
          },
          {
            "name": "ADV-2007-0900",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0900"
          },
          {
            "name": "22888",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22888"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.edgewall.org/wiki/ChangeLog"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-03-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the \"download wiki page as text\" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "24470",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24470"
        },
        {
          "name": "trac-downloadwikipageastext-xss(32897)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
        },
        {
          "name": "ADV-2007-0900",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0900"
        },
        {
          "name": "22888",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22888"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.edgewall.org/wiki/ChangeLog"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1405",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the \"download wiki page as text\" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "24470",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24470"
            },
            {
              "name": "trac-downloadwikipageastext-xss(32897)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
            },
            {
              "name": "ADV-2007-0900",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0900"
            },
            {
              "name": "22888",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22888"
            },
            {
              "name": "http://trac.edgewall.org/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://trac.edgewall.org/wiki/ChangeLog"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1405",
    "datePublished": "2007-03-10T22:00:00",
    "dateReserved": "2007-03-10T00:00:00",
    "dateUpdated": "2024-08-07T12:59:06.754Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5878 (GCVE-0-2006-5878)

Vulnerability from cvelistv5 – Published: 2006-11-14 19:00 – Updated: 2024-08-07 20:04
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://security.gentoo.org/glsa/glsa-200612-14.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/22789 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1209 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/23357 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4422 vdb-entryx_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/22868 third-party-advisoryx_refsource_SECUNIA
http://trac.edgewall.org/ticket/4049 x_refsource_MISC
http://trac.edgewall.org/wiki/ChangeLog x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:04:55.766Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-200612-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
          },
          {
            "name": "22789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22789"
          },
          {
            "name": "DSA-1209",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1209"
          },
          {
            "name": "23357",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23357"
          },
          {
            "name": "ADV-2006-4422",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4422"
          },
          {
            "name": "trac-unspecified-csrf(30146)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
          },
          {
            "name": "22868",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22868"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://trac.edgewall.org/ticket/4049"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.edgewall.org/wiki/ChangeLog"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-200612-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
        },
        {
          "name": "22789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22789"
        },
        {
          "name": "DSA-1209",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1209"
        },
        {
          "name": "23357",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23357"
        },
        {
          "name": "ADV-2006-4422",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4422"
        },
        {
          "name": "trac-unspecified-csrf(30146)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
        },
        {
          "name": "22868",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22868"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://trac.edgewall.org/ticket/4049"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.edgewall.org/wiki/ChangeLog"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5878",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-200612-14",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
            },
            {
              "name": "22789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22789"
            },
            {
              "name": "DSA-1209",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1209"
            },
            {
              "name": "23357",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23357"
            },
            {
              "name": "ADV-2006-4422",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4422"
            },
            {
              "name": "trac-unspecified-csrf(30146)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
            },
            {
              "name": "22868",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22868"
            },
            {
              "name": "http://trac.edgewall.org/ticket/4049",
              "refsource": "MISC",
              "url": "http://trac.edgewall.org/ticket/4049"
            },
            {
              "name": "http://trac.edgewall.org/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://trac.edgewall.org/wiki/ChangeLog"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5878",
    "datePublished": "2006-11-14T19:00:00",
    "dateReserved": "2006-11-14T00:00:00",
    "dateUpdated": "2024-08-07T20:04:55.766Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-3695 (GCVE-0-2006-3695)

Vulnerability from cvelistv5 – Published: 2006-07-19 01:00 – Updated: 2024-08-07 18:39
VLAI?
Summary
Trac before 0.9.6 does not disable the "raw" or "include" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.vupen.com/english/advisories/2006/2729 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/20958 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1016457 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/18323 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.debian.org/security/2006/dsa-1152 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/21534 third-party-advisoryx_refsource_SECUNIA
http://trac.edgewall.org/wiki/ChangeLog x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:39:53.571Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "trac-restructuredtext-obtain-information(27706)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
          },
          {
            "name": "ADV-2006-2729",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2729"
          },
          {
            "name": "20958",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20958"
          },
          {
            "name": "1016457",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016457"
          },
          {
            "name": "18323",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18323"
          },
          {
            "name": "trac-restructuredtext-dos(27708)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
          },
          {
            "name": "DSA-1152",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1152"
          },
          {
            "name": "21534",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21534"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.edgewall.org/wiki/ChangeLog"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Trac before 0.9.6 does not disable the \"raw\" or \"include\" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "trac-restructuredtext-obtain-information(27706)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
        },
        {
          "name": "ADV-2006-2729",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2729"
        },
        {
          "name": "20958",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20958"
        },
        {
          "name": "1016457",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016457"
        },
        {
          "name": "18323",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18323"
        },
        {
          "name": "trac-restructuredtext-dos(27708)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
        },
        {
          "name": "DSA-1152",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1152"
        },
        {
          "name": "21534",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21534"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.edgewall.org/wiki/ChangeLog"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-3695",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Trac before 0.9.6 does not disable the \"raw\" or \"include\" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "trac-restructuredtext-obtain-information(27706)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
            },
            {
              "name": "ADV-2006-2729",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2729"
            },
            {
              "name": "20958",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20958"
            },
            {
              "name": "1016457",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016457"
            },
            {
              "name": "18323",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18323"
            },
            {
              "name": "trac-restructuredtext-dos(27708)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
            },
            {
              "name": "DSA-1152",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1152"
            },
            {
              "name": "21534",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21534"
            },
            {
              "name": "http://trac.edgewall.org/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://trac.edgewall.org/wiki/ChangeLog"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-3695",
    "datePublished": "2006-07-19T01:00:00",
    "dateReserved": "2006-07-18T00:00:00",
    "dateUpdated": "2024-08-07T18:39:53.571Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-2106 (GCVE-0-2006-2106)

Vulnerability from cvelistv5 – Published: 2006-04-29 10:00 – Updated: 2024-08-07 17:35
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a "wiki macro."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/19870 third-party-advisoryx_refsource_SECUNIA
http://jvn.jp/jp/JVN%2384091359/index.html third-party-advisoryx_refsource_JVN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.edgewall.com/blog/news/trac_0_9_5.html x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/1557 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1015986 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/17741 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:35:31.382Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "19870",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19870"
          },
          {
            "name": "JVN#84091359",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/jp/JVN%2384091359/index.html"
          },
          {
            "name": "trac-wiki-engine-xss(26125)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
          },
          {
            "name": "ADV-2006-1557",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1557"
          },
          {
            "name": "1015986",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015986"
          },
          {
            "name": "17741",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17741"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-04-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a \"wiki macro.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "19870",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19870"
        },
        {
          "name": "JVN#84091359",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/jp/JVN%2384091359/index.html"
        },
        {
          "name": "trac-wiki-engine-xss(26125)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
        },
        {
          "name": "ADV-2006-1557",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1557"
        },
        {
          "name": "1015986",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015986"
        },
        {
          "name": "17741",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17741"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2106",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a \"wiki macro.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "19870",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19870"
            },
            {
              "name": "JVN#84091359",
              "refsource": "JVN",
              "url": "http://jvn.jp/jp/JVN%2384091359/index.html"
            },
            {
              "name": "trac-wiki-engine-xss(26125)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
            },
            {
              "name": "http://www.edgewall.com/blog/news/trac_0_9_5.html",
              "refsource": "CONFIRM",
              "url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
            },
            {
              "name": "ADV-2006-1557",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1557"
            },
            {
              "name": "1015986",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015986"
            },
            {
              "name": "17741",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17741"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2106",
    "datePublished": "2006-04-29T10:00:00",
    "dateReserved": "2006-04-29T00:00:00",
    "dateUpdated": "2024-08-07T17:35:31.382Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4644 (GCVE-0-2005-4644)

Vulnerability from cvelistv5 – Published: 2006-01-11 21:00 – Updated: 2024-08-07 23:53
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/18555 third-party-advisoryx_refsource_SECUNIA
http://trac.edgewall.org/ticket/2473 x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/18465 third-party-advisoryx_refsource_SECUNIA
http://projects.edgewall.com/trac/ticket/2473 x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/0226 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/16198 vdb-entryx_refsource_BID
http://www.debian.org/security/2006/dsa-951 vendor-advisoryx_refsource_DEBIAN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:53:28.548Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18555",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18555"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.edgewall.org/ticket/2473"
          },
          {
            "name": "trac-html-xss(24183)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
          },
          {
            "name": "18465",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18465"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://projects.edgewall.com/trac/ticket/2473"
          },
          {
            "name": "ADV-2006-0226",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0226"
          },
          {
            "name": "16198",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16198"
          },
          {
            "name": "DSA-951",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-951"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18555",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18555"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.edgewall.org/ticket/2473"
        },
        {
          "name": "trac-html-xss(24183)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
        },
        {
          "name": "18465",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18465"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://projects.edgewall.com/trac/ticket/2473"
        },
        {
          "name": "ADV-2006-0226",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0226"
        },
        {
          "name": "16198",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16198"
        },
        {
          "name": "DSA-951",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-951"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4644",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18555",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18555"
            },
            {
              "name": "http://trac.edgewall.org/ticket/2473",
              "refsource": "CONFIRM",
              "url": "http://trac.edgewall.org/ticket/2473"
            },
            {
              "name": "trac-html-xss(24183)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
            },
            {
              "name": "18465",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18465"
            },
            {
              "name": "http://projects.edgewall.com/trac/ticket/2473",
              "refsource": "CONFIRM",
              "url": "http://projects.edgewall.com/trac/ticket/2473"
            },
            {
              "name": "ADV-2006-0226",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0226"
            },
            {
              "name": "16198",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16198"
            },
            {
              "name": "DSA-951",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-951"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4644",
    "datePublished": "2006-01-11T21:00:00",
    "dateReserved": "2006-01-11T00:00:00",
    "dateUpdated": "2024-08-07T23:53:28.548Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4305 (GCVE-0-2005-4305)

Vulnerability from cvelistv5 – Published: 2005-12-17 00:00 – Updated: 2024-08-07 23:38
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.gentoo.org/security/en/glsa/glsa-20060… vendor-advisoryx_refsource_GENTOO
http://securitytracker.com/id?1015363 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2005/2936 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/16386 vdb-entryx_refsource_BID
http://projects.edgewall.com/trac/wiki/ChangeLog x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/18048 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/18625 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:38:51.647Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-200601-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
          },
          {
            "name": "1015363",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015363"
          },
          {
            "name": "ADV-2005-2936",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2936"
          },
          {
            "name": "16386",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16386"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
          },
          {
            "name": "trac-url-path-xss(23775)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
          },
          {
            "name": "18048",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18048"
          },
          {
            "name": "18625",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18625"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-200601-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
        },
        {
          "name": "1015363",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015363"
        },
        {
          "name": "ADV-2005-2936",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2936"
        },
        {
          "name": "16386",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16386"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
        },
        {
          "name": "trac-url-path-xss(23775)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
        },
        {
          "name": "18048",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18048"
        },
        {
          "name": "18625",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18625"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4305",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-200601-12",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
            },
            {
              "name": "1015363",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015363"
            },
            {
              "name": "ADV-2005-2936",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2936"
            },
            {
              "name": "16386",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16386"
            },
            {
              "name": "http://projects.edgewall.com/trac/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
            },
            {
              "name": "trac-url-path-xss(23775)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
            },
            {
              "name": "18048",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18048"
            },
            {
              "name": "18625",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18625"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4305",
    "datePublished": "2005-12-17T00:00:00",
    "dateReserved": "2005-12-16T00:00:00",
    "dateUpdated": "2024-08-07T23:38:51.647Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4065 (GCVE-0-2005-4065)

Vulnerability from cvelistv5 – Published: 2005-12-07 11:00 – Updated: 2024-08-07 23:31
VLAI?
Summary
SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/18555 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/21459 vdb-entryx_refsource_OSVDB
http://lists.edgewall.com/archive/trac/2005-Decem… mailing-listx_refsource_MLIST
http://securityreason.com/securityalert/222 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/17894 third-party-advisoryx_refsource_SECUNIA
http://projects.edgewall.com/trac/wiki/ChangeLog x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2005/2766 vdb-entryx_refsource_VUPEN
http://www.debian.org/security/2006/dsa-951 vendor-advisoryx_refsource_DEBIAN
http://www.securityfocus.com/bid/15720 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:31:48.938Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18555",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18555"
          },
          {
            "name": "21459",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21459"
          },
          {
            "name": "[Trac] 20051205 SECURITY: Trac 0.9.2 Released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
          },
          {
            "name": "222",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/222"
          },
          {
            "name": "17894",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17894"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
          },
          {
            "name": "ADV-2005-2766",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2766"
          },
          {
            "name": "DSA-951",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-951"
          },
          {
            "name": "15720",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15720"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-12-12T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18555",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18555"
        },
        {
          "name": "21459",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21459"
        },
        {
          "name": "[Trac] 20051205 SECURITY: Trac 0.9.2 Released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
        },
        {
          "name": "222",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/222"
        },
        {
          "name": "17894",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17894"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
        },
        {
          "name": "ADV-2005-2766",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2766"
        },
        {
          "name": "DSA-951",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-951"
        },
        {
          "name": "15720",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15720"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4065",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18555",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18555"
            },
            {
              "name": "21459",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21459"
            },
            {
              "name": "[Trac] 20051205 SECURITY: Trac 0.9.2 Released",
              "refsource": "MLIST",
              "url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
            },
            {
              "name": "222",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/222"
            },
            {
              "name": "17894",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17894"
            },
            {
              "name": "http://projects.edgewall.com/trac/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
            },
            {
              "name": "ADV-2005-2766",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2766"
            },
            {
              "name": "DSA-951",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-951"
            },
            {
              "name": "15720",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15720"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4065",
    "datePublished": "2005-12-07T11:00:00",
    "dateReserved": "2005-12-07T00:00:00",
    "dateUpdated": "2024-08-07T23:31:48.938Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-3980 (GCVE-0-2005-3980)

Vulnerability from cvelistv5 – Published: 2005-12-04 11:00 – Updated: 2024-08-07 23:31
VLAI?
Summary
SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/418294/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/21386 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/17836/ third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2005/2701 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/15676/ vdb-entryx_refsource_BID
http://projects.edgewall.com/trac/wiki/ChangeLog x_refsource_CONFIRM
http://securitytracker.com/id?1015302 vdb-entryx_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:31:48.901Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20051201 Edgewall Trac SQL Injection Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
          },
          {
            "name": "21386",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21386"
          },
          {
            "name": "17836",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17836/"
          },
          {
            "name": "ADV-2005-2701",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2701"
          },
          {
            "name": "15676",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15676/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
          },
          {
            "name": "1015302",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015302"
          },
          {
            "name": "trac-query-sql-injection(23461)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20051201 Edgewall Trac SQL Injection Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
        },
        {
          "name": "21386",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21386"
        },
        {
          "name": "17836",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17836/"
        },
        {
          "name": "ADV-2005-2701",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2701"
        },
        {
          "name": "15676",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15676/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
        },
        {
          "name": "1015302",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015302"
        },
        {
          "name": "trac-query-sql-injection(23461)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3980",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20051201 Edgewall Trac SQL Injection Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
            },
            {
              "name": "21386",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21386"
            },
            {
              "name": "17836",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17836/"
            },
            {
              "name": "ADV-2005-2701",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2701"
            },
            {
              "name": "15676",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15676/"
            },
            {
              "name": "http://projects.edgewall.com/trac/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
            },
            {
              "name": "1015302",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015302"
            },
            {
              "name": "trac-query-sql-injection(23461)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3980",
    "datePublished": "2005-12-04T11:00:00",
    "dateReserved": "2005-12-04T00:00:00",
    "dateUpdated": "2024-08-07T23:31:48.901Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-3328 (GCVE-0-2008-3328)

Vulnerability from nvd – Published: 2008-07-27 22:00 – Updated: 2024-08-07 09:37
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.securityfocus.com/bid/30400 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/31231 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/31314 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2223… vdb-entryx_refsource_VUPEN
http://trac.edgewall.org/wiki/ChangeLog x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:37:26.950Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2008-6833",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
          },
          {
            "name": "FEDORA-2008-6830",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
          },
          {
            "name": "30400",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30400"
          },
          {
            "name": "trac-wikiengine-xss(44016)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
          },
          {
            "name": "31231",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31231"
          },
          {
            "name": "31314",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31314"
          },
          {
            "name": "ADV-2008-2223",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2223/references"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.edgewall.org/wiki/ChangeLog"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "FEDORA-2008-6833",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
        },
        {
          "name": "FEDORA-2008-6830",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
        },
        {
          "name": "30400",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30400"
        },
        {
          "name": "trac-wikiengine-xss(44016)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
        },
        {
          "name": "31231",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31231"
        },
        {
          "name": "31314",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31314"
        },
        {
          "name": "ADV-2008-2223",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2223/references"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.edgewall.org/wiki/ChangeLog"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3328",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2008-6833",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html"
            },
            {
              "name": "FEDORA-2008-6830",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html"
            },
            {
              "name": "30400",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30400"
            },
            {
              "name": "trac-wikiengine-xss(44016)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44016"
            },
            {
              "name": "31231",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31231"
            },
            {
              "name": "31314",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31314"
            },
            {
              "name": "ADV-2008-2223",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2223/references"
            },
            {
              "name": "http://trac.edgewall.org/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://trac.edgewall.org/wiki/ChangeLog"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3328",
    "datePublished": "2008-07-27T22:00:00",
    "dateReserved": "2008-07-27T00:00:00",
    "dateUpdated": "2024-08-07T09:37:26.950Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-1406 (GCVE-0-2007-1406)

Vulnerability from nvd – Published: 2007-03-10 22:00 – Updated: 2024-09-16 23:47
VLAI?
Summary
Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain "unsafe" situations, which has unknown impact and remote attack vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:59:06.989Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.edgewall.org/wiki/ChangeLog"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain \"unsafe\" situations, which has unknown impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-03-10T22:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.edgewall.org/wiki/ChangeLog"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1406",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain \"unsafe\" situations, which has unknown impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://trac.edgewall.org/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://trac.edgewall.org/wiki/ChangeLog"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1406",
    "datePublished": "2007-03-10T22:00:00Z",
    "dateReserved": "2007-03-10T00:00:00Z",
    "dateUpdated": "2024-09-16T23:47:02.146Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-1405 (GCVE-0-2007-1405)

Vulnerability from nvd – Published: 2007-03-10 22:00 – Updated: 2024-08-07 12:59
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the "download wiki page as text" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/24470 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.vupen.com/english/advisories/2007/0900 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/22888 vdb-entryx_refsource_BID
http://trac.edgewall.org/wiki/ChangeLog x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:59:06.754Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "24470",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24470"
          },
          {
            "name": "trac-downloadwikipageastext-xss(32897)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
          },
          {
            "name": "ADV-2007-0900",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0900"
          },
          {
            "name": "22888",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22888"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.edgewall.org/wiki/ChangeLog"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-03-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the \"download wiki page as text\" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "24470",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24470"
        },
        {
          "name": "trac-downloadwikipageastext-xss(32897)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
        },
        {
          "name": "ADV-2007-0900",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0900"
        },
        {
          "name": "22888",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22888"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.edgewall.org/wiki/ChangeLog"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1405",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the \"download wiki page as text\" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "24470",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24470"
            },
            {
              "name": "trac-downloadwikipageastext-xss(32897)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32897"
            },
            {
              "name": "ADV-2007-0900",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0900"
            },
            {
              "name": "22888",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22888"
            },
            {
              "name": "http://trac.edgewall.org/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://trac.edgewall.org/wiki/ChangeLog"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1405",
    "datePublished": "2007-03-10T22:00:00",
    "dateReserved": "2007-03-10T00:00:00",
    "dateUpdated": "2024-08-07T12:59:06.754Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5878 (GCVE-0-2006-5878)

Vulnerability from nvd – Published: 2006-11-14 19:00 – Updated: 2024-08-07 20:04
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://security.gentoo.org/glsa/glsa-200612-14.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/22789 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1209 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/23357 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4422 vdb-entryx_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/22868 third-party-advisoryx_refsource_SECUNIA
http://trac.edgewall.org/ticket/4049 x_refsource_MISC
http://trac.edgewall.org/wiki/ChangeLog x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:04:55.766Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-200612-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
          },
          {
            "name": "22789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22789"
          },
          {
            "name": "DSA-1209",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1209"
          },
          {
            "name": "23357",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23357"
          },
          {
            "name": "ADV-2006-4422",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4422"
          },
          {
            "name": "trac-unspecified-csrf(30146)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
          },
          {
            "name": "22868",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22868"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://trac.edgewall.org/ticket/4049"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.edgewall.org/wiki/ChangeLog"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-200612-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
        },
        {
          "name": "22789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22789"
        },
        {
          "name": "DSA-1209",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1209"
        },
        {
          "name": "23357",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23357"
        },
        {
          "name": "ADV-2006-4422",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4422"
        },
        {
          "name": "trac-unspecified-csrf(30146)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
        },
        {
          "name": "22868",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22868"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://trac.edgewall.org/ticket/4049"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.edgewall.org/wiki/ChangeLog"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5878",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-200612-14",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200612-14.xml"
            },
            {
              "name": "22789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22789"
            },
            {
              "name": "DSA-1209",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1209"
            },
            {
              "name": "23357",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23357"
            },
            {
              "name": "ADV-2006-4422",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4422"
            },
            {
              "name": "trac-unspecified-csrf(30146)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30146"
            },
            {
              "name": "22868",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22868"
            },
            {
              "name": "http://trac.edgewall.org/ticket/4049",
              "refsource": "MISC",
              "url": "http://trac.edgewall.org/ticket/4049"
            },
            {
              "name": "http://trac.edgewall.org/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://trac.edgewall.org/wiki/ChangeLog"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5878",
    "datePublished": "2006-11-14T19:00:00",
    "dateReserved": "2006-11-14T00:00:00",
    "dateUpdated": "2024-08-07T20:04:55.766Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-3695 (GCVE-0-2006-3695)

Vulnerability from nvd – Published: 2006-07-19 01:00 – Updated: 2024-08-07 18:39
VLAI?
Summary
Trac before 0.9.6 does not disable the "raw" or "include" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.vupen.com/english/advisories/2006/2729 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/20958 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1016457 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/18323 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.debian.org/security/2006/dsa-1152 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/21534 third-party-advisoryx_refsource_SECUNIA
http://trac.edgewall.org/wiki/ChangeLog x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:39:53.571Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "trac-restructuredtext-obtain-information(27706)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
          },
          {
            "name": "ADV-2006-2729",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2729"
          },
          {
            "name": "20958",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20958"
          },
          {
            "name": "1016457",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016457"
          },
          {
            "name": "18323",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18323"
          },
          {
            "name": "trac-restructuredtext-dos(27708)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
          },
          {
            "name": "DSA-1152",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1152"
          },
          {
            "name": "21534",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21534"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.edgewall.org/wiki/ChangeLog"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Trac before 0.9.6 does not disable the \"raw\" or \"include\" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "trac-restructuredtext-obtain-information(27706)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
        },
        {
          "name": "ADV-2006-2729",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2729"
        },
        {
          "name": "20958",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20958"
        },
        {
          "name": "1016457",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016457"
        },
        {
          "name": "18323",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18323"
        },
        {
          "name": "trac-restructuredtext-dos(27708)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
        },
        {
          "name": "DSA-1152",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1152"
        },
        {
          "name": "21534",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21534"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.edgewall.org/wiki/ChangeLog"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-3695",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Trac before 0.9.6 does not disable the \"raw\" or \"include\" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "trac-restructuredtext-obtain-information(27706)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27706"
            },
            {
              "name": "ADV-2006-2729",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2729"
            },
            {
              "name": "20958",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20958"
            },
            {
              "name": "1016457",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016457"
            },
            {
              "name": "18323",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18323"
            },
            {
              "name": "trac-restructuredtext-dos(27708)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27708"
            },
            {
              "name": "DSA-1152",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1152"
            },
            {
              "name": "21534",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21534"
            },
            {
              "name": "http://trac.edgewall.org/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://trac.edgewall.org/wiki/ChangeLog"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-3695",
    "datePublished": "2006-07-19T01:00:00",
    "dateReserved": "2006-07-18T00:00:00",
    "dateUpdated": "2024-08-07T18:39:53.571Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-2106 (GCVE-0-2006-2106)

Vulnerability from nvd – Published: 2006-04-29 10:00 – Updated: 2024-08-07 17:35
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a "wiki macro."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/19870 third-party-advisoryx_refsource_SECUNIA
http://jvn.jp/jp/JVN%2384091359/index.html third-party-advisoryx_refsource_JVN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.edgewall.com/blog/news/trac_0_9_5.html x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/1557 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1015986 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/17741 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:35:31.382Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "19870",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19870"
          },
          {
            "name": "JVN#84091359",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/jp/JVN%2384091359/index.html"
          },
          {
            "name": "trac-wiki-engine-xss(26125)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
          },
          {
            "name": "ADV-2006-1557",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1557"
          },
          {
            "name": "1015986",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015986"
          },
          {
            "name": "17741",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17741"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-04-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a \"wiki macro.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "19870",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19870"
        },
        {
          "name": "JVN#84091359",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/jp/JVN%2384091359/index.html"
        },
        {
          "name": "trac-wiki-engine-xss(26125)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
        },
        {
          "name": "ADV-2006-1557",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1557"
        },
        {
          "name": "1015986",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015986"
        },
        {
          "name": "17741",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17741"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2106",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a \"wiki macro.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "19870",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19870"
            },
            {
              "name": "JVN#84091359",
              "refsource": "JVN",
              "url": "http://jvn.jp/jp/JVN%2384091359/index.html"
            },
            {
              "name": "trac-wiki-engine-xss(26125)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26125"
            },
            {
              "name": "http://www.edgewall.com/blog/news/trac_0_9_5.html",
              "refsource": "CONFIRM",
              "url": "http://www.edgewall.com/blog/news/trac_0_9_5.html"
            },
            {
              "name": "ADV-2006-1557",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1557"
            },
            {
              "name": "1015986",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015986"
            },
            {
              "name": "17741",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17741"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2106",
    "datePublished": "2006-04-29T10:00:00",
    "dateReserved": "2006-04-29T00:00:00",
    "dateUpdated": "2024-08-07T17:35:31.382Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4644 (GCVE-0-2005-4644)

Vulnerability from nvd – Published: 2006-01-11 21:00 – Updated: 2024-08-07 23:53
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/18555 third-party-advisoryx_refsource_SECUNIA
http://trac.edgewall.org/ticket/2473 x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/18465 third-party-advisoryx_refsource_SECUNIA
http://projects.edgewall.com/trac/ticket/2473 x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/0226 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/16198 vdb-entryx_refsource_BID
http://www.debian.org/security/2006/dsa-951 vendor-advisoryx_refsource_DEBIAN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:53:28.548Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18555",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18555"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.edgewall.org/ticket/2473"
          },
          {
            "name": "trac-html-xss(24183)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
          },
          {
            "name": "18465",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18465"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://projects.edgewall.com/trac/ticket/2473"
          },
          {
            "name": "ADV-2006-0226",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0226"
          },
          {
            "name": "16198",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16198"
          },
          {
            "name": "DSA-951",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-951"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18555",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18555"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.edgewall.org/ticket/2473"
        },
        {
          "name": "trac-html-xss(24183)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
        },
        {
          "name": "18465",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18465"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://projects.edgewall.com/trac/ticket/2473"
        },
        {
          "name": "ADV-2006-0226",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0226"
        },
        {
          "name": "16198",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16198"
        },
        {
          "name": "DSA-951",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-951"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4644",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18555",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18555"
            },
            {
              "name": "http://trac.edgewall.org/ticket/2473",
              "refsource": "CONFIRM",
              "url": "http://trac.edgewall.org/ticket/2473"
            },
            {
              "name": "trac-html-xss(24183)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
            },
            {
              "name": "18465",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18465"
            },
            {
              "name": "http://projects.edgewall.com/trac/ticket/2473",
              "refsource": "CONFIRM",
              "url": "http://projects.edgewall.com/trac/ticket/2473"
            },
            {
              "name": "ADV-2006-0226",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0226"
            },
            {
              "name": "16198",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16198"
            },
            {
              "name": "DSA-951",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-951"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4644",
    "datePublished": "2006-01-11T21:00:00",
    "dateReserved": "2006-01-11T00:00:00",
    "dateUpdated": "2024-08-07T23:53:28.548Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4305 (GCVE-0-2005-4305)

Vulnerability from nvd – Published: 2005-12-17 00:00 – Updated: 2024-08-07 23:38
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.gentoo.org/security/en/glsa/glsa-20060… vendor-advisoryx_refsource_GENTOO
http://securitytracker.com/id?1015363 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2005/2936 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/16386 vdb-entryx_refsource_BID
http://projects.edgewall.com/trac/wiki/ChangeLog x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/18048 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/18625 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:38:51.647Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-200601-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
          },
          {
            "name": "1015363",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015363"
          },
          {
            "name": "ADV-2005-2936",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2936"
          },
          {
            "name": "16386",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16386"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
          },
          {
            "name": "trac-url-path-xss(23775)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
          },
          {
            "name": "18048",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18048"
          },
          {
            "name": "18625",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18625"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-200601-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
        },
        {
          "name": "1015363",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015363"
        },
        {
          "name": "ADV-2005-2936",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2936"
        },
        {
          "name": "16386",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16386"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
        },
        {
          "name": "trac-url-path-xss(23775)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
        },
        {
          "name": "18048",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18048"
        },
        {
          "name": "18625",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18625"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4305",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Edgewall Trac 0.9, 0.9.1, and 0.9.2 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly sanitized before it is returned in an error page."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-200601-12",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-12.xml"
            },
            {
              "name": "1015363",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015363"
            },
            {
              "name": "ADV-2005-2936",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2936"
            },
            {
              "name": "16386",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16386"
            },
            {
              "name": "http://projects.edgewall.com/trac/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
            },
            {
              "name": "trac-url-path-xss(23775)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23775"
            },
            {
              "name": "18048",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18048"
            },
            {
              "name": "18625",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18625"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4305",
    "datePublished": "2005-12-17T00:00:00",
    "dateReserved": "2005-12-16T00:00:00",
    "dateUpdated": "2024-08-07T23:38:51.647Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4065 (GCVE-0-2005-4065)

Vulnerability from nvd – Published: 2005-12-07 11:00 – Updated: 2024-08-07 23:31
VLAI?
Summary
SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/18555 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/21459 vdb-entryx_refsource_OSVDB
http://lists.edgewall.com/archive/trac/2005-Decem… mailing-listx_refsource_MLIST
http://securityreason.com/securityalert/222 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/17894 third-party-advisoryx_refsource_SECUNIA
http://projects.edgewall.com/trac/wiki/ChangeLog x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2005/2766 vdb-entryx_refsource_VUPEN
http://www.debian.org/security/2006/dsa-951 vendor-advisoryx_refsource_DEBIAN
http://www.securityfocus.com/bid/15720 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:31:48.938Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18555",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18555"
          },
          {
            "name": "21459",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21459"
          },
          {
            "name": "[Trac] 20051205 SECURITY: Trac 0.9.2 Released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
          },
          {
            "name": "222",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/222"
          },
          {
            "name": "17894",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17894"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
          },
          {
            "name": "ADV-2005-2766",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2766"
          },
          {
            "name": "DSA-951",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-951"
          },
          {
            "name": "15720",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15720"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-12-12T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18555",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18555"
        },
        {
          "name": "21459",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21459"
        },
        {
          "name": "[Trac] 20051205 SECURITY: Trac 0.9.2 Released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
        },
        {
          "name": "222",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/222"
        },
        {
          "name": "17894",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17894"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
        },
        {
          "name": "ADV-2005-2766",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2766"
        },
        {
          "name": "DSA-951",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-951"
        },
        {
          "name": "15720",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15720"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4065",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18555",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18555"
            },
            {
              "name": "21459",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21459"
            },
            {
              "name": "[Trac] 20051205 SECURITY: Trac 0.9.2 Released",
              "refsource": "MLIST",
              "url": "http://lists.edgewall.com/archive/trac/2005-December/005777.html"
            },
            {
              "name": "222",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/222"
            },
            {
              "name": "17894",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17894"
            },
            {
              "name": "http://projects.edgewall.com/trac/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
            },
            {
              "name": "ADV-2005-2766",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2766"
            },
            {
              "name": "DSA-951",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-951"
            },
            {
              "name": "15720",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15720"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4065",
    "datePublished": "2005-12-07T11:00:00",
    "dateReserved": "2005-12-07T00:00:00",
    "dateUpdated": "2024-08-07T23:31:48.938Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-3980 (GCVE-0-2005-3980)

Vulnerability from nvd – Published: 2005-12-04 11:00 – Updated: 2024-08-07 23:31
VLAI?
Summary
SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/418294/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/21386 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/17836/ third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2005/2701 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/15676/ vdb-entryx_refsource_BID
http://projects.edgewall.com/trac/wiki/ChangeLog x_refsource_CONFIRM
http://securitytracker.com/id?1015302 vdb-entryx_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:31:48.901Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20051201 Edgewall Trac SQL Injection Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
          },
          {
            "name": "21386",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21386"
          },
          {
            "name": "17836",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17836/"
          },
          {
            "name": "ADV-2005-2701",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2701"
          },
          {
            "name": "15676",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15676/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
          },
          {
            "name": "1015302",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015302"
          },
          {
            "name": "trac-query-sql-injection(23461)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20051201 Edgewall Trac SQL Injection Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
        },
        {
          "name": "21386",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21386"
        },
        {
          "name": "17836",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17836/"
        },
        {
          "name": "ADV-2005-2701",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2701"
        },
        {
          "name": "15676",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15676/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
        },
        {
          "name": "1015302",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015302"
        },
        {
          "name": "trac-query-sql-injection(23461)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3980",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the ticket query module in Edgewall Trac 0.9 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the group parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20051201 Edgewall Trac SQL Injection Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/418294/100/0/threaded"
            },
            {
              "name": "21386",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21386"
            },
            {
              "name": "17836",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17836/"
            },
            {
              "name": "ADV-2005-2701",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2701"
            },
            {
              "name": "15676",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15676/"
            },
            {
              "name": "http://projects.edgewall.com/trac/wiki/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://projects.edgewall.com/trac/wiki/ChangeLog"
            },
            {
              "name": "1015302",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015302"
            },
            {
              "name": "trac-query-sql-injection(23461)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23461"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3980",
    "datePublished": "2005-12-04T11:00:00",
    "dateReserved": "2005-12-04T00:00:00",
    "dateUpdated": "2024-08-07T23:31:48.901Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}