FKIE_CVE-2012-6074

Vulnerability from fkie_nvd - Published: 2013-02-24 22:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote authenticated users with write access to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
cloudbees jenkins *
jenkins jenkins 1.400
jenkins jenkins 1.401
jenkins jenkins 1.402
jenkins jenkins 1.403
jenkins jenkins 1.404
jenkins jenkins 1.405
jenkins jenkins 1.406
jenkins jenkins 1.407
jenkins jenkins 1.408
jenkins jenkins 1.409
jenkins jenkins 1.410
jenkins jenkins 1.411
jenkins jenkins 1.412
jenkins jenkins 1.413
jenkins jenkins 1.414
jenkins jenkins 1.415
jenkins jenkins 1.416
jenkins jenkins 1.417
jenkins jenkins 1.418
jenkins jenkins 1.419
jenkins jenkins 1.420
jenkins jenkins 1.421
jenkins jenkins 1.422
jenkins jenkins 1.423
jenkins jenkins 1.424
jenkins jenkins 1.425
jenkins jenkins 1.426
jenkins jenkins 1.427
jenkins jenkins 1.428
jenkins jenkins 1.429
jenkins jenkins 1.430
jenkins jenkins 1.431
jenkins jenkins 1.432
jenkins jenkins 1.433
jenkins jenkins 1.434
jenkins jenkins 1.435
jenkins jenkins 1.436
jenkins jenkins 1.437
cloudbees jenkins 1.447.1.1
cloudbees jenkins 1.447.2.2
cloudbees jenkins 1.447.3.1
cloudbees jenkins 1.424.0.2
cloudbees jenkins 1.424.0.4
cloudbees jenkins 1.424.1.1
cloudbees jenkins 1.424.2.1
cloudbees jenkins 1.424.4.1
cloudbees jenkins 1.424.5.1
cloudbees jenkins 1.424.6.1
cloudbees jenkins 1.424.6.11
cloudbees jenkins 1.466.1.2
cloudbees jenkins 1.466.2.1
cloudbees jenkins 1.400
cloudbees jenkins 1.424
cloudbees jenkins 1.447
jenkins jenkins *
jenkins jenkins 1.409.1
jenkins jenkins 1.409.2
jenkins jenkins 1.409.3
jenkins jenkins 1.424.1
jenkins jenkins 1.424.2
jenkins jenkins 1.424.3
jenkins jenkins 1.424.4
jenkins jenkins 1.424.5
jenkins jenkins 1.424.6
jenkins jenkins 1.447.1
jenkins jenkins 1.447.2
jenkins jenkins 1.466.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3D692CD-0DD7-4777-AE59-13CB723BCC2D",
              "versionEndIncluding": "1.480.3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.400:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8F7CBDA-3667-4BC3-84DD-1544621A085B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.401:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82FC15F-E309-49D5-AE5D-9A7B2D14E87A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.402:*:*:*:*:*:*:*",
              "matchCriteriaId": "79096D36-805A-4A51-807D-D8ADD539E02E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.403:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C784E41-2F84-43DD-8CB5-BF351885248F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.404:*:*:*:*:*:*:*",
              "matchCriteriaId": "34A76EBB-2ECB-403F-B56D-C39E6119435E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.405:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D429FE3-D808-4625-BD44-703D2E87EE0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.406:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FE7E602-AD1A-4547-A3AC-C9F8B94EAF3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.407:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8B008A-76C7-495A-B8A6-25BA19E37C9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.408:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD609494-12EA-40AC-8EA7-30E9454BF533",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.409:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6CA4168-E3B3-42A1-90BC-66D6ADA1A847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.410:*:*:*:*:*:*:*",
              "matchCriteriaId": "1657F755-942D-4F6F-A55A-F0633BD14547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.411:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2231A9B-4E1F-4077-8B3F-C7FDAE73475D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.412:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF9A1C7-7C53-46BC-B433-34FE9A11C2C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.413:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA19A7DF-A800-4664-B799-1FCBA8D63788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.414:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1F843B-56CD-4A67-92C3-AC4957221D81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.415:*:*:*:*:*:*:*",
              "matchCriteriaId": "C53EC41A-13ED-432C-9240-FA429E85B1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.416:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DEF2C98-D4A5-4004-BD39-6400531FF7EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.417:*:*:*:*:*:*:*",
              "matchCriteriaId": "E357EACF-210E-433F-81F1-659A4F3352B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.418:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD8EE26-DB37-49FC-B8D6-7D56FA249D19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.419:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2808D7-72FD-4EB7-9459-21F611509305",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.420:*:*:*:*:*:*:*",
              "matchCriteriaId": "891AAB03-DA45-4AB3-B0F4-01FCD4E545C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.421:*:*:*:*:*:*:*",
              "matchCriteriaId": "D27D4E1B-82CC-490B-AF4D-52EAC7DF85CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.422:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B1C29A7-1226-4179-9275-20C98D649631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.423:*:*:*:*:*:*:*",
              "matchCriteriaId": "8924363E-3C74-4AE6-9CAB-74FF38E16457",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7DF595E-17B5-4DDF-A875-B650AA789F21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.425:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2F76FBA-5E35-4A3D-85E6-9778982B246D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.426:*:*:*:*:*:*:*",
              "matchCriteriaId": "E15232BB-090A-448C-BD50-92C97984CC96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F4A0247-3C79-4F78-A086-877B5C5E1252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.428:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAA375A6-68B4-49D0-BDD0-E7FB0276C9DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.429:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D44683-47F1-4E7A-8B63-F2932836CD3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.430:*:*:*:*:*:*:*",
              "matchCriteriaId": "0523F7C0-BCA4-4A75-BA83-0E0BEEED279A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.431:*:*:*:*:*:*:*",
              "matchCriteriaId": "A52383BB-66BF-4C87-9DA5-B278DD32CA66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "359CC43E-9ADC-4270-A015-0D1CD6D98B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.433:*:*:*:*:*:*:*",
              "matchCriteriaId": "2968A12D-7CAF-4D8B-8E88-28204EA284FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.434:*:*:*:*:*:*:*",
              "matchCriteriaId": "17E95B6C-05F4-46A0-B36F-7F6A52B848F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.435:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CAF85B-B825-4B7A-ACF9-A52E1E930592",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.436:*:*:*:*:*:*:*",
              "matchCriteriaId": "75416939-96FB-4970-AB14-4374F3B80504",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.437:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B78DF52-88A5-49A9-B705-16B42A9039C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447.1.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "64DC99F9-DA01-4A7B-9AB6-8CCBEB1C0E54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447.2.2:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "894B96E5-3B3C-4D0E-8BED-5911A2AA2D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447.3.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "54BF2C2C-C920-41B7-A938-DA6CFADCEC3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.0.2:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "4D47B599-AD9E-4CC7-99B0-5BBCE21FE12E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.0.4:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "1A64AD04-F3A7-493D-9092-D44203390ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.1.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "1008C47A-B18E-4888-A8D0-5E3BAE4406C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.2.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "9103E105-898E-49CB-AAEE-A01948678537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.4.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "46ACF9F0-E9B9-4BAC-A351-470E8B102737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.5.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "FDC2EC22-7A4F-492F-9723-386B238CAA88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.6.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "EF8269EF-2E74-4B21-ADFD-8AECD2383176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424.6.11:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "713EEE59-CAE4-4E35-9E56-31BFB6311640",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.466.1.2:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "26046DC7-335B-4E29-86F3-A2077AD32AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.466.2.1:-:enterprise:*:*:*:*:*",
              "matchCriteriaId": "C5D05B3A-8709-4061-810E-656B6D5BDAED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.400:-:lts:*:*:*:*:*",
              "matchCriteriaId": "65C51F95-07E8-4F9F-B0D9-D5E5360F17F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424:-:lts:*:*:*:*:*",
              "matchCriteriaId": "E3A59F7E-1D1C-4E78-8CCC-4C05CBC6DE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447:-:lts:*:*:*:*:*",
              "matchCriteriaId": "830BA953-FE5C-457F-9CD5-8DAB70C54CC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06E9DD9A-E695-4F26-9790-D41D6C265CA7",
              "versionEndIncluding": "1.466.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.409.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEA024CA-1D9C-44B8-88B8-3663691B6EF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.409.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B759C60-B2D2-4C0C-89C2-6A089982C945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.409.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E73C86A-5AC5-4D9D-9F5C-BDF5F06C45B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F09B4E-DD5B-477C-9547-7C2D8039BCD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "744A5B4A-7B8E-40FE-9FE2-C935822FC65A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF148AFF-8AF1-43B8-B184-CAC0436F86AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CB21AA0-964A-4F69-8570-1742A5E6DA2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9517BF55-D76E-4A2B-A439-E43AC11B5C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0693E3B0-678C-4029-9A3F-64128D631571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.447.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F21028-9881-4669-B367-E9B35AC7601B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.447.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "59D9137C-C8DD-47A2-8D7F-318BAADA2A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jenkins:jenkins:1.466.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC602437-C693-4555-A4DA-A061BAF3E2F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote authenticated users with write access to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de XSS en Jenkins en versiones anteriores a 1.491, Jenkins LTS en versiones anteriores a 1.480.1 y Jenkins Enterprise 1.424.x en versiones anteriores a 1.424.6.13, 1.447.x en versiones anteriores a 1.447.4.1 y 1.466.x en versiones anteriores a 1.466.10.1 permite a usuarios remotos autenticados con acceso de escritura inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2012-6074",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-02-24T22:55:01.207",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/12/28/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890612"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/12/28/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…