cve-2007-5038
Vulnerability from cvelistv5
Published
2007-09-24 00:00
Modified
2024-08-07 15:17
Severity ?
Summary
The offer_account_by_email function in User.pm in the WebService for Bugzilla before 3.0.2, and 3.1.x before 3.1.2, does not check the value of the createemailregexp parameter, which allows remote attackers to bypass intended restrictions on account creation.
References
cve@mitre.orghttp://fedoranews.org/updates/FEDORA-2007-229.shtml
cve@mitre.orghttp://secunia.com/advisories/26848Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26969
cve@mitre.orghttp://www.bugzilla.org/security/3.0.1/Patch
cve@mitre.orghttp://www.securityfocus.com/archive/1/480077/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/25725
cve@mitre.orghttp://www.securitytracker.com/id?1018719
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/3200
cve@mitre.orghttps://bugzilla.mozilla.org/show_bug.cgi?id=395632Exploit
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=299981
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/36692
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/updates/FEDORA-2007-229.shtml
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26848Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26969
af854a3a-2127-422b-91ae-364da2661108http://www.bugzilla.org/security/3.0.1/Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/480077/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25725
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018719
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3200
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.mozilla.org/show_bug.cgi?id=395632Exploit
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=299981
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/36692
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:17:28.103Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2007-2299",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://fedoranews.org/updates/FEDORA-2007-229.shtml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=395632"
          },
          {
            "name": "ADV-2007-3200",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3200"
          },
          {
            "name": "20070919 Security Advisory for Bugzilla 3.0.1 and 3.1.1",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/480077/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=299981"
          },
          {
            "name": "26969",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26969"
          },
          {
            "name": "1018719",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018719"
          },
          {
            "name": "26848",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26848"
          },
          {
            "name": "bugzilla-offeraccount-security-bypass(36692)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36692"
          },
          {
            "name": "25725",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25725"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.bugzilla.org/security/3.0.1/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-09-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The offer_account_by_email function in User.pm in the WebService for Bugzilla before 3.0.2, and 3.1.x before 3.1.2, does not check the value of the createemailregexp parameter, which allows remote attackers to bypass intended restrictions on account creation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "FEDORA-2007-2299",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://fedoranews.org/updates/FEDORA-2007-229.shtml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=395632"
        },
        {
          "name": "ADV-2007-3200",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3200"
        },
        {
          "name": "20070919 Security Advisory for Bugzilla 3.0.1 and 3.1.1",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/480077/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=299981"
        },
        {
          "name": "26969",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26969"
        },
        {
          "name": "1018719",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018719"
        },
        {
          "name": "26848",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26848"
        },
        {
          "name": "bugzilla-offeraccount-security-bypass(36692)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36692"
        },
        {
          "name": "25725",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25725"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.bugzilla.org/security/3.0.1/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-5038",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The offer_account_by_email function in User.pm in the WebService for Bugzilla before 3.0.2, and 3.1.x before 3.1.2, does not check the value of the createemailregexp parameter, which allows remote attackers to bypass intended restrictions on account creation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2007-2299",
              "refsource": "FEDORA",
              "url": "http://fedoranews.org/updates/FEDORA-2007-229.shtml"
            },
            {
              "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=395632",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=395632"
            },
            {
              "name": "ADV-2007-3200",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3200"
            },
            {
              "name": "20070919 Security Advisory for Bugzilla 3.0.1 and 3.1.1",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/480077/100/0/threaded"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=299981",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=299981"
            },
            {
              "name": "26969",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26969"
            },
            {
              "name": "1018719",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018719"
            },
            {
              "name": "26848",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26848"
            },
            {
              "name": "bugzilla-offeraccount-security-bypass(36692)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36692"
            },
            {
              "name": "25725",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25725"
            },
            {
              "name": "http://www.bugzilla.org/security/3.0.1/",
              "refsource": "CONFIRM",
              "url": "http://www.bugzilla.org/security/3.0.1/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-5038",
    "datePublished": "2007-09-24T00:00:00",
    "dateReserved": "2007-09-23T00:00:00",
    "dateUpdated": "2024-08-07T15:17:28.103Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45C36666-518F-4956-816A-940930425955\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF2DF96F-E45E-45AF-85E5-E939F923EC1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"154EA18F-534C-4095-837D-BB9865D25F23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"585F05F2-B294-4218-9209-C487B4D2994B\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The offer_account_by_email function in User.pm in the WebService for Bugzilla before 3.0.2, and 3.1.x before 3.1.2, does not check the value of the createemailregexp parameter, which allows remote attackers to bypass intended restrictions on account creation.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n offer_account_by_email en User.pm en el WebService para Bugzilla before 3.0.2, y 3.1.x anterior a 3.1.2, no valida el valor del par\\u00e1metro createemailregexp, el cual permite a atacantes remotos evitar las restricciones previstas sobre la creaci\\u00f3n de una cuenta.\"}]",
      "id": "CVE-2007-5038",
      "lastModified": "2024-11-21T00:36:59.897",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}",
      "published": "2007-09-24T00:17:00.000",
      "references": "[{\"url\": \"http://fedoranews.org/updates/FEDORA-2007-229.shtml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/26848\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26969\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.bugzilla.org/security/3.0.1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/480077/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/25725\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1018719\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/3200\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=395632\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=299981\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/36692\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://fedoranews.org/updates/FEDORA-2007-229.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26848\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26969\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.bugzilla.org/security/3.0.1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/480077/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/25725\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1018719\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/3200\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=395632\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=299981\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/36692\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-5038\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-09-24T00:17:00.000\",\"lastModified\":\"2024-11-21T00:36:59.897\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The offer_account_by_email function in User.pm in the WebService for Bugzilla before 3.0.2, and 3.1.x before 3.1.2, does not check the value of the createemailregexp parameter, which allows remote attackers to bypass intended restrictions on account creation.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n offer_account_by_email en User.pm en el WebService para Bugzilla before 3.0.2, y 3.1.x anterior a 3.1.2, no valida el valor del par\u00e1metro createemailregexp, el cual permite a atacantes remotos evitar las restricciones previstas sobre la creaci\u00f3n de una cuenta.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C36666-518F-4956-816A-940930425955\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF2DF96F-E45E-45AF-85E5-E939F923EC1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"154EA18F-534C-4095-837D-BB9865D25F23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585F05F2-B294-4218-9209-C487B4D2994B\"}]}]}],\"references\":[{\"url\":\"http://fedoranews.org/updates/FEDORA-2007-229.shtml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/26848\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26969\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.bugzilla.org/security/3.0.1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/archive/1/480077/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/25725\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1018719\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3200\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=395632\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=299981\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/36692\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://fedoranews.org/updates/FEDORA-2007-229.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26848\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26969\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.bugzilla.org/security/3.0.1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/archive/1/480077/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/25725\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1018719\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3200\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=395632\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=299981\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/36692\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.