CVE-2008-4769 (GCVE-0-2008-4769)
Vulnerability from cvelistv5 – Published: 2008-10-28 10:00 – Updated: 2024-08-07 10:31
VLAI?
Summary
Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Date Public ?
2008-04-25 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T10:31:26.935Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "wordpress-cat-directory-traversal(41920)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41920"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://trac.wordpress.org/changeset/7586"
},
{
"name": "28845",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28845"
},
{
"name": "DSA-1871",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1871"
},
{
"name": "29949",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29949"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.juniper.fi/security/auto/vulnerabilities/vuln28845.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-04-25T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. NOTE: some of these details are obtained from third party information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "wordpress-cat-directory-traversal(41920)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41920"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://trac.wordpress.org/changeset/7586"
},
{
"name": "28845",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28845"
},
{
"name": "DSA-1871",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1871"
},
{
"name": "29949",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29949"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.juniper.fi/security/auto/vulnerabilities/vuln28845.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-4769",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. NOTE: some of these details are obtained from third party information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "wordpress-cat-directory-traversal(41920)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41920"
},
{
"name": "http://trac.wordpress.org/changeset/7586",
"refsource": "MISC",
"url": "http://trac.wordpress.org/changeset/7586"
},
{
"name": "28845",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28845"
},
{
"name": "DSA-1871",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1871"
},
{
"name": "29949",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29949"
},
{
"name": "http://www.juniper.fi/security/auto/vulnerabilities/vuln28845.html",
"refsource": "MISC",
"url": "http://www.juniper.fi/security/auto/vulnerabilities/vuln28845.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-4769",
"datePublished": "2008-10-28T10:00:00.000Z",
"dateReserved": "2008-10-27T00:00:00.000Z",
"dateUpdated": "2024-08-07T10:31:26.935Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2008-4769",
"date": "2026-04-17",
"epss": "0.1766",
"percentile": "0.95114"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.3.3\", \"matchCriteriaId\": \"BC7D93B4-23A0-457E-B68C-BC6DDD1DB6FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FEB898B-BF80-44C1-A847-AC0062458B58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3C33D37-2FFF-4DE5-B260-E090F4E6377B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E70EF48-AD6C-4119-B7C4-67E889A2BB27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E4139FE-7C43-44AC-856F-226E1194D936\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0395AD1D-3470-49EE-9F2A-349EF8782B40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C8B90E9-5DF5-45F5-9810-2973FDAA16A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC499ABC-D1A6-4A9B-A06B-12C8275462DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F33ACD9-B4B6-4B5E-9CD5-26AA5997119C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"056E641C-9322-4BEE-97B4-FE16DE8D7336\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADB42CEF-E12D-4DB0-8536-FD393D3697A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4AF89F9-AE67-49B5-ACF0-3A645C454E84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0174AF4F-9759-4762-ACF4-688E232AF1EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7D86BA1-3DC8-478C-B2FA-581F9AE1F93E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEE015E8-FDE1-47FA-B3E5-0DC2C0A5107D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E7BEFBD-4326-44A5-A160-9406D94AB307\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C516C041-B945-4992-8104-E20B3B6CECDE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E85A88D7-07A1-4A8C-88B5-057AD9C675E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFBD4E49-EA17-4FFD-AF9C-950E542555A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"0666BEBE-BE45-41D3-8C53-E4C9E6853C1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F2F19C7-DD9A-4851-8788-E3E4E8CE8E79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C4229BC-1646-4202-92B8-FC718D557518\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B64D4777-2ED6-4A47-A8F3-38A3A8EB1ACB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"614956CB-0582-4EAD-86F4-5AB0BB781CE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A4FEB48-771B-4331-B42B-764F12A94B47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"947635DB-A86E-45F0-B946-559202C49503\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"503E4894-3F39-471F-9A56-052718813BF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B86BC4AC-62D0-47AA-8E81-50ED0B3CB88E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38085E5A-7B41-4E43-8A22-5FD44970F3EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF628FB8-1AC4-4F15-9967-E60785A32D1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F0BF1F6-A54A-48E8-A872-015FE10E5D03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F0B6EAC-E43D-4D1B-856F-7C23250A2355\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51FAD0FC-CE84-4332-B061-75C0C8A0B6AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AEABEFD-E248-42B7-B99E-FFDEE27F7064\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDCFE9AA-39E9-4366-AAB7-F7A891BC797E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAF4671A-8449-438E-922B-94E5542137BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92F05A1F-2227-4166-807B-1BDE2EA8F245\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CF73E23-7CD0-429C-986B-5F721F1696BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EECE66B3-3696-4E98-AF63-DF2FB256A6FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E75BB382-6B47-4C6A-BF94-80443BEB1A23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFA75368-506F-4772-B0F2-8AAECDF288F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDDD9E5C-766F-4945-B87D-781E780AB03E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A48C0BB5-2D87-49ED-A8EB-843E5F0EAE8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6AAA17D-FBB8-4F54-82E2-870D6FA5C299\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2A0CAEE-5C14-44C6-85FB-6AFDAAA1C3F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77D85664-E355-4A68-89EB-D5C9D0E6B916\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91243043-F4A6-40EF-97FC-989ED366394C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66BE667A-A937-4C38-B4D5-29B33F23F7B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A3624D4-E666-4A1B-B465-714ACBA0034C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.1:alpha_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"46B86AD1-967D-4C8E-BD31-C2A2197B1E84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A7CBC45-320E-48CF-9A63-07DDE2FB61BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"266E32CD-66FB-4E19-8091-EC748B177D8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3DD9120-2224-4612-A6EE-539F47BD50E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14B0A9E4-9D09-4127-AF8B-4DA6D488E67C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8C667FD-BA00-43B3-8313-5A24A2DFF55A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A9FBA02-8A6A-471F-92CD-D8E77B5061C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1D97C81-A053-4D73-BEA7-CBCB5FC0CC83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B5BC7E8-4C8A-4183-AB8C-1DAE12935387\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0F9137B-D13F-488B-8196-85E06FAB682E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82F257F4-CB62-4C6F-8866-AA253EC8C0C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AC4F089-A606-4880-8C5D-24520B55CD14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4F6724F-AC94-4D6B-BEB7-EF4683FD1A07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79AB6F6F-2FE3-4FC3-9009-D40EA852711F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A82F4D88-779D-4D5D-96CD-2B31B61BA29E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4801D56C-5ED6-4648-A0C9-EB4D06786A55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA0DABD9-DE15-4619-8668-0277A67F5205\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40BEC573-A346-4F07-8053-A5F6E92A343C\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. NOTE: some of these details are obtained from third party information.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de salto de directorio en la funci\\u00f3n get_category_template en wp-includes/theme.php en WordPress v2.3.3 y anteriores y v2.5, permite a atacantes remotos incluir y posiblemente ejecutar archivos PHP de su elecci\\u00f3n a trav\\u00e9s del par\\u00e1metro \\\"cat\\\" en index.php. NOTA: parte de estos detalles han sido obtenidos de terceros.\"}]",
"id": "CVE-2008-4769",
"lastModified": "2024-11-21T00:52:30.910",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2008-10-28T10:30:01.290",
"references": "[{\"url\": \"http://secunia.com/advisories/29949\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://trac.wordpress.org/changeset/7586\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1871\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.juniper.fi/security/auto/vulnerabilities/vuln28845.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/28845\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/41920\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/29949\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://trac.wordpress.org/changeset/7586\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1871\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.juniper.fi/security/auto/vulnerabilities/vuln28845.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/28845\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/41920\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2008-4769\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-10-28T10:30:01.290\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. NOTE: some of these details are obtained from third party information.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de salto de directorio en la funci\u00f3n get_category_template en wp-includes/theme.php en WordPress v2.3.3 y anteriores y v2.5, permite a atacantes remotos incluir y posiblemente ejecutar archivos PHP de su elecci\u00f3n a trav\u00e9s del par\u00e1metro \\\"cat\\\" en index.php. NOTA: parte de estos detalles han sido obtenidos de terceros.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.3.3\",\"matchCriteriaId\":\"BC7D93B4-23A0-457E-B68C-BC6DDD1DB6FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FEB898B-BF80-44C1-A847-AC0062458B58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3C33D37-2FFF-4DE5-B260-E090F4E6377B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E70EF48-AD6C-4119-B7C4-67E889A2BB27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4139FE-7C43-44AC-856F-226E1194D936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0395AD1D-3470-49EE-9F2A-349EF8782B40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C8B90E9-5DF5-45F5-9810-2973FDAA16A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC499ABC-D1A6-4A9B-A06B-12C8275462DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F33ACD9-B4B6-4B5E-9CD5-26AA5997119C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"056E641C-9322-4BEE-97B4-FE16DE8D7336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADB42CEF-E12D-4DB0-8536-FD393D3697A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4AF89F9-AE67-49B5-ACF0-3A645C454E84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0174AF4F-9759-4762-ACF4-688E232AF1EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7D86BA1-3DC8-478C-B2FA-581F9AE1F93E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEE015E8-FDE1-47FA-B3E5-0DC2C0A5107D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E7BEFBD-4326-44A5-A160-9406D94AB307\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C516C041-B945-4992-8104-E20B3B6CECDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E85A88D7-07A1-4A8C-88B5-057AD9C675E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFBD4E49-EA17-4FFD-AF9C-950E542555A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"0666BEBE-BE45-41D3-8C53-E4C9E6853C1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F2F19C7-DD9A-4851-8788-E3E4E8CE8E79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4229BC-1646-4202-92B8-FC718D557518\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64D4777-2ED6-4A47-A8F3-38A3A8EB1ACB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"614956CB-0582-4EAD-86F4-5AB0BB781CE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A4FEB48-771B-4331-B42B-764F12A94B47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"947635DB-A86E-45F0-B946-559202C49503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"503E4894-3F39-471F-9A56-052718813BF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B86BC4AC-62D0-47AA-8E81-50ED0B3CB88E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38085E5A-7B41-4E43-8A22-5FD44970F3EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF628FB8-1AC4-4F15-9967-E60785A32D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F0BF1F6-A54A-48E8-A872-015FE10E5D03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F0B6EAC-E43D-4D1B-856F-7C23250A2355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51FAD0FC-CE84-4332-B061-75C0C8A0B6AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AEABEFD-E248-42B7-B99E-FFDEE27F7064\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDCFE9AA-39E9-4366-AAB7-F7A891BC797E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAF4671A-8449-438E-922B-94E5542137BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92F05A1F-2227-4166-807B-1BDE2EA8F245\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF73E23-7CD0-429C-986B-5F721F1696BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EECE66B3-3696-4E98-AF63-DF2FB256A6FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E75BB382-6B47-4C6A-BF94-80443BEB1A23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFA75368-506F-4772-B0F2-8AAECDF288F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDDD9E5C-766F-4945-B87D-781E780AB03E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A48C0BB5-2D87-49ED-A8EB-843E5F0EAE8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6AAA17D-FBB8-4F54-82E2-870D6FA5C299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A0CAEE-5C14-44C6-85FB-6AFDAAA1C3F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77D85664-E355-4A68-89EB-D5C9D0E6B916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91243043-F4A6-40EF-97FC-989ED366394C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BE667A-A937-4C38-B4D5-29B33F23F7B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A3624D4-E666-4A1B-B465-714ACBA0034C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.1:alpha_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"46B86AD1-967D-4C8E-BD31-C2A2197B1E84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A7CBC45-320E-48CF-9A63-07DDE2FB61BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"266E32CD-66FB-4E19-8091-EC748B177D8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3DD9120-2224-4612-A6EE-539F47BD50E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B0A9E4-9D09-4127-AF8B-4DA6D488E67C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C667FD-BA00-43B3-8313-5A24A2DFF55A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A9FBA02-8A6A-471F-92CD-D8E77B5061C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1D97C81-A053-4D73-BEA7-CBCB5FC0CC83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B5BC7E8-4C8A-4183-AB8C-1DAE12935387\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0F9137B-D13F-488B-8196-85E06FAB682E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82F257F4-CB62-4C6F-8866-AA253EC8C0C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC4F089-A606-4880-8C5D-24520B55CD14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4F6724F-AC94-4D6B-BEB7-EF4683FD1A07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79AB6F6F-2FE3-4FC3-9009-D40EA852711F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82F4D88-779D-4D5D-96CD-2B31B61BA29E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4801D56C-5ED6-4648-A0C9-EB4D06786A55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0DABD9-DE15-4619-8668-0277A67F5205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40BEC573-A346-4F07-8053-A5F6E92A343C\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/29949\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://trac.wordpress.org/changeset/7586\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1871\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.juniper.fi/security/auto/vulnerabilities/vuln28845.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/28845\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41920\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/29949\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://trac.wordpress.org/changeset/7586\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1871\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.juniper.fi/security/auto/vulnerabilities/vuln28845.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/28845\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41920\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…