CVE-2010-4803 (GCVE-0-2010-4803)

Vulnerability from cvelistv5 – Published: 2011-05-03 00:03 – Updated: 2024-08-07 04:02
VLAI?
Summary
Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:02:29.557Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
          },
          {
            "name": "DSA-2239",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2239"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-08-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-08-27T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
        },
        {
          "name": "DSA-2239",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2239"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4803",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes",
              "refsource": "CONFIRM",
              "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
            },
            {
              "name": "DSA-2239",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2239"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4803",
    "datePublished": "2011-05-03T00:03:00",
    "dateReserved": "2011-05-02T00:00:00",
    "dateUpdated": "2024-08-07T04:02:29.557Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"0.999926\", \"matchCriteriaId\": \"25683375-5B17-469D-AB89-A1A7E165948C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"083A2DA9-38BB-4AF8-9FF0-41101E830A0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2C11EC7-D91E-4F65-9C8A-801C724EDBBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC33620B-2B78-4221-8067-15E8BC56865A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69AC00B5-717B-4F7F-AD25-9754BEFD7221\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2E2469A-BE25-4D18-8E7D-F709DCB86FCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02BB8742-9D5C-4831-BD2F-A24505B8E4C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82CA1476-123D-44D5-A1E8-D9C58F6D9949\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"479781F2-9614-4552-AE39-12AC41ABB3AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78D1279D-333D-4338-B4ED-07BB1900FB0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D21184D-8823-4162-961D-8A7856557786\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"538FC292-B6BF-4551-AE44-259E0B61B680\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.8.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"574F7A7C-3986-401D-A58F-6C8F7D922002\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDACD094-8117-460E-B7D1-E63EC00B97A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.8006:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6965DAA1-FDD8-484B-873A-F6D13227FAD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.8007:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9865E142-BB29-4718-BD85-F40E185BF31E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.8008:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F667C15-3C89-49CD-800D-303A2677FC36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.8009:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B301544-A38F-417C-BB94-E7711F8ED7C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.9001:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADEBDEB2-3070-4633-A934-DDF49CBD10C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.9002:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5875A25D-CC0E-43CF-B617-CEA99C65A52A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991231:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8C04B9B-DEA3-4161-8E6C-BBBBE9AF5444\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991232:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE5F9699-7B1B-4356-B0EB-C942888AFEE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991233:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A041B8EB-AD9E-452B-9A2E-22DBCD5CB091\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991234:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BE7A136-3975-400A-AB77-4BCD4669553A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991235:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE628F19-D7C9-4E6D-BDC4-5C82CDE540E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991236:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26803A52-EAEC-4CD6-BB89-F1EF40B3021F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991237:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7BC4454-3168-420B-9136-21FD18571526\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991238:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A346280F-BA80-4FBA-BD15-6CA7A1ED8D8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991239:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0376F10-8493-498D-9B5D-76AFE0F4417A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991240:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69293BBF-7788-4462-AA6F-9D3A084D1B3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991241:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31F30FA3-69EC-45B3-8AF5-852DB73756A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991242:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B88557E4-C793-4F6A-A3AE-07799B212ECB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991243:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F88C231-60FE-42F3-87E9-23E88ADC7650\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991244:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD65F43C-98A9-46A1-BCC4-79ACB5F5C6B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991245:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0A9F1C7-1C0A-42B1-91D3-676E03E64BB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991246:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A886B4DC-30E9-4C41-A79A-96F309F343F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991250:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C28AEC3C-20F0-4BFB-B7B6-30336C631400\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.991251:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D0521BF-A66D-4663-83C6-49E650454ED5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999901:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C95BB3D-774C-4C71-9A3A-15938BA5CF6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999902:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B583B413-4B8E-4FA3-9CD1-A650CEAB9449\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999903:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDC7A6F1-BD38-4119-B5A7-56A50EC6C9C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999904:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DEFF843-57F4-4553-ABD3-7269A32A6DE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999905:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8A7C4E6-5E3E-43CB-8F54-4AA5563EA98C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999906:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6CB9879-D8B4-45CA-BF63-D4681C403818\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999907:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66EE203A-CFB1-4317-879D-E6A44F063F66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999908:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7978FDA-7622-4041-BE9E-28F99A1FB16E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999909:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0975B5B-5409-42F5-A50F-644A80F3E5F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999910:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69AB9069-49F9-43B5-9F0F-04BBB145FD7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999911:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77CA7A3A-254D-4154-8AFB-FA7BC4EB286A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999912:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FA8D9CE-BD9E-4BD2-B38C-909CCE0D3842\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999913:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DABFC81-F44C-46AB-B9CD-D35624F5071A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999914:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE8BDB83-641B-4858-B00A-EEFC9F583050\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999920:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D010713B-DE3E-4E76-8299-FF50D19ADA45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999921:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92B83ECE-5D7C-417D-9957-976ECE8E2308\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999922:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59E2E6AF-11DD-4C51-A84F-129D160ACAFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999923:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9590109-8DFC-4E78-B678-8456A0621C08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999924:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03FD1031-0C3D-45F1-BFD9-823C6D4B69F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mojolicious:mojolicious:0.999925:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44059C1E-CDC6-4B75-92CC-CD45C5063F9D\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors.\"}, {\"lang\": \"es\", \"value\": \"Mojolicious antes de v0.999927 no aplica adecuadamente las sumas de comprobaci\\u00f3n HMAC - MD5, lo cual tiene un impacto sin especificar y vectores de ataque remotos\"}]",
      "id": "CVE-2010-4803",
      "lastModified": "2024-11-21T01:21:48.757",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": true, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2011-05-03T00:55:00.997",
      "references": "[{\"url\": \"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2011/dsa-2239\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2011/dsa-2239\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2010-4803\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-05-03T00:55:00.997\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors.\"},{\"lang\":\"es\",\"value\":\"Mojolicious antes de v0.999927 no aplica adecuadamente las sumas de comprobaci\u00f3n HMAC - MD5, lo cual tiene un impacto sin especificar y vectores de ataque remotos\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.999926\",\"matchCriteriaId\":\"25683375-5B17-469D-AB89-A1A7E165948C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"083A2DA9-38BB-4AF8-9FF0-41101E830A0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2C11EC7-D91E-4F65-9C8A-801C724EDBBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC33620B-2B78-4221-8067-15E8BC56865A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69AC00B5-717B-4F7F-AD25-9754BEFD7221\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2E2469A-BE25-4D18-8E7D-F709DCB86FCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02BB8742-9D5C-4831-BD2F-A24505B8E4C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82CA1476-123D-44D5-A1E8-D9C58F6D9949\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479781F2-9614-4552-AE39-12AC41ABB3AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78D1279D-333D-4338-B4ED-07BB1900FB0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D21184D-8823-4162-961D-8A7856557786\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"538FC292-B6BF-4551-AE44-259E0B61B680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"574F7A7C-3986-401D-A58F-6C8F7D922002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDACD094-8117-460E-B7D1-E63EC00B97A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8006:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6965DAA1-FDD8-484B-873A-F6D13227FAD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8007:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9865E142-BB29-4718-BD85-F40E185BF31E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8008:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F667C15-3C89-49CD-800D-303A2677FC36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8009:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B301544-A38F-417C-BB94-E7711F8ED7C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.9001:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADEBDEB2-3070-4633-A934-DDF49CBD10C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.9002:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5875A25D-CC0E-43CF-B617-CEA99C65A52A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991231:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8C04B9B-DEA3-4161-8E6C-BBBBE9AF5444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991232:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5F9699-7B1B-4356-B0EB-C942888AFEE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991233:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A041B8EB-AD9E-452B-9A2E-22DBCD5CB091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991234:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BE7A136-3975-400A-AB77-4BCD4669553A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991235:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE628F19-D7C9-4E6D-BDC4-5C82CDE540E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991236:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26803A52-EAEC-4CD6-BB89-F1EF40B3021F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991237:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7BC4454-3168-420B-9136-21FD18571526\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991238:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A346280F-BA80-4FBA-BD15-6CA7A1ED8D8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991239:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0376F10-8493-498D-9B5D-76AFE0F4417A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991240:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69293BBF-7788-4462-AA6F-9D3A084D1B3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991241:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31F30FA3-69EC-45B3-8AF5-852DB73756A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991242:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B88557E4-C793-4F6A-A3AE-07799B212ECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991243:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F88C231-60FE-42F3-87E9-23E88ADC7650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991244:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD65F43C-98A9-46A1-BCC4-79ACB5F5C6B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991245:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A9F1C7-1C0A-42B1-91D3-676E03E64BB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991246:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A886B4DC-30E9-4C41-A79A-96F309F343F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991250:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C28AEC3C-20F0-4BFB-B7B6-30336C631400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991251:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D0521BF-A66D-4663-83C6-49E650454ED5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999901:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C95BB3D-774C-4C71-9A3A-15938BA5CF6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999902:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B583B413-4B8E-4FA3-9CD1-A650CEAB9449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999903:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDC7A6F1-BD38-4119-B5A7-56A50EC6C9C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999904:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DEFF843-57F4-4553-ABD3-7269A32A6DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999905:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8A7C4E6-5E3E-43CB-8F54-4AA5563EA98C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999906:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6CB9879-D8B4-45CA-BF63-D4681C403818\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999907:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66EE203A-CFB1-4317-879D-E6A44F063F66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999908:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7978FDA-7622-4041-BE9E-28F99A1FB16E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999909:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0975B5B-5409-42F5-A50F-644A80F3E5F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999910:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69AB9069-49F9-43B5-9F0F-04BBB145FD7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999911:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77CA7A3A-254D-4154-8AFB-FA7BC4EB286A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999912:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FA8D9CE-BD9E-4BD2-B38C-909CCE0D3842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999913:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DABFC81-F44C-46AB-B9CD-D35624F5071A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999914:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8BDB83-641B-4858-B00A-EEFC9F583050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999920:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D010713B-DE3E-4E76-8299-FF50D19ADA45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999921:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92B83ECE-5D7C-417D-9957-976ECE8E2308\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999922:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59E2E6AF-11DD-4C51-A84F-129D160ACAFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999923:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9590109-8DFC-4E78-B678-8456A0621C08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999924:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FD1031-0C3D-45F1-BFD9-823C6D4B69F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999925:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44059C1E-CDC6-4B75-92CC-CD45C5063F9D\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2239\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2239\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…