CVE-2009-4610 (GCVE-0-2009-4610)
Vulnerability from cvelistv5
Published
2010-01-13 20:00
Modified
2024-09-16 22:08
Severity ?
CWE
  • n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Mort Bay Jetty 6.x and 7.0.0 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to jsp/dump.jsp in the JSP Dump feature, or the (2) Name or (3) Value parameter to the default URI for the Session Dump Servlet under session/.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:08:38.059Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in Mort Bay Jetty 6.x and 7.0.0 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to jsp/dump.jsp in the JSP Dump feature, or the (2) Name or (3) Value parameter to the default URI for the Session Dump Servlet under session/."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-01-13T20:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4610",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in Mort Bay Jetty 6.x and 7.0.0 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to jsp/dump.jsp in the JSP Dump feature, or the (2) Name or (3) Value parameter to the default URI for the Session Dump Servlet under session/."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt",
              "refsource": "MISC",
              "url": "http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4610",
    "datePublished": "2010-01-13T20:00:00Z",
    "dateReserved": "2010-01-13T00:00:00Z",
    "dateUpdated": "2024-09-16T22:08:49.637Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-4610\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-01-13T20:30:00.703\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple cross-site scripting (XSS) vulnerabilities in Mort Bay Jetty 6.x and 7.0.0 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to jsp/dump.jsp in the JSP Dump feature, or the (2) Name or (3) Value parameter to the default URI for the Session Dump Servlet under session/.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados en Mort Bay Jetty v6.x y v7.0.0, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de (1) una petici\u00f3n de cadena a jsp/dump.jsp en la caracter\u00edstica JSP Dump o el (2) Name o (3)  el par\u00e1metro Value a la URI por defecto para el Session Dump Servlet bajo session/.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D427FB0-D97B-40D7-A03D-FDB972C219FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:alpha0:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9B1ACB4-A7B4-4207-8C71-045B4E066474\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EBB87BA-6FFA-40F1-9075-CACC03ECF964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"53C17181-13E0-47F2-B35C-2375CC25B0CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D2ACDC9-9FF6-4A25-9296-2E088606B38D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"8665FE23-C558-4346-9920-36F0AE8A47AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B19D912-0A07-4EED-A7D2-81C7493AE481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta10:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB95EB3C-61C4-46FB-AF57-1AEED089D014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta11:*:*:*:*:*:*\",\"matchCriteriaId\":\"96B26040-AAD7-4CE2-AFA5-FD711C36A4F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta12:*:*:*:*:*:*\",\"matchCriteriaId\":\"27027709-B180-4DAE-9385-3E407E3EF4A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta14:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E580541-5375-46AA-B42C-55B0F8C15758\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta15:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB9AA914-09E3-4346-BC9A-9DCBD0D1EA8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta16:*:*:*:*:*:*\",\"matchCriteriaId\":\"803B064D-32BF-4137-A320-8B8579C269DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta17:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B5C42D8-5A59-4A23-A86D-538F285497FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"47FF0752-AB64-4352-9B55-2198EA927625\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F933B53-4F01-42B8-AC09-1C31D4836093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFD54477-BAE2-4833-AEDF-FAFD80F64F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C407D54-6828-4298-9331-7F94E0BF28E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"9861AD14-AFFB-4A4E-91BF-BF323230012A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8EC131C-BE8C-4F1C-AC83-8E84CF4199C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCF4C1FC-9F4C-4763-A7D9-9FFC8F0B392F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:beta9:*:*:*:*:*:*\",\"matchCriteriaId\":\"06E74876-6E82-412C-8B74-019BF7CC71CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:betax:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8410DED-A0E5-4318-9370-7994D476CBBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:rc0:*:*:*:*:*:*\",\"matchCriteriaId\":\"547FEA12-F46C-4585-92D1-B390452D982A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3956FC00-6776-42B6-8386-50F99F91833D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1C831B8-C865-444D-A18B-569D80D27AAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E41EF8-5DD7-4018-ABF9-1FCEFA631351\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EDB585-7123-40F1-84B2-36F0282E7C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FEA754C-343D-4FB3-BA64-4C7691285126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C1CFEDA-5F30-48B9-8B0F-E36CB579DDED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"586B69D3-7734-4ECA-8E84-8FEB2A914471\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.0:pre0:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61DE1A4-36B9-4EDD-9628-B736318973C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.0:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C981EEAA-1D2B-44BC-9ED5-D3851F31A67F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.0:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A7D5DD4-EB54-4C4C-8090-421C3319EDEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.0:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADB640DA-460C-45EC-8F02-A03E055ED15F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.0:rc0:*:*:*:*:*:*\",\"matchCriteriaId\":\"079E0899-2130-431E-9805-013A8B853BEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"10681635-C15C-44C8-BFB5-67912D4D39E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E75B9E0D-D7CD-47EA-AB0C-86645CA2DF54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A877189B-8D9E-4A09-AC1C-831D0E15E686\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A411147B-CE7E-4277-A5DF-83B90C4FC97D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.1:rc0:*:*:*:*:*:*\",\"matchCriteriaId\":\"0615E5DF-590A-454D-BEE3-ACEB16DD83E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B83BFC82-97CF-40FF-B087-3B2B2DC5EE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.2:pre0:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5DE9EF1-22BC-4182-8905-038AA06F8A31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.2:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DAB11DB-4B81-4DDA-A29F-DEE72658E903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.2:rc0:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CCEF874-0F28-40F3-84D7-9B2F1510054A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A6F86D-B74A-467E-A16C-25A255CC61D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1BC12C8-98F4-4F41-979C-540F08908199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.2:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4B5666F-C034-4656-A2D8-5D804CA3AA66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.2:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7EC937F-3C86-4E63-86E2-0118DAD15430\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.2:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"699F1242-4422-4134-B191-F42CA8EAA91E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B7810EC-58C5-4BB4-B2E5-6196364B3F22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56644769-E21B-46E3-9131-4078500F9B91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.4:rc0:*:*:*:*:*:*\",\"matchCriteriaId\":\"812CC60A-71D8-47E2-BE60-BCE975418047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B860EF7-0F72-45D6-B4B6-D3E29B07F88C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2C2A9E3-8C89-4D2D-AECA-55415DDD4BEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.5:rc0:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3550007-F89A-4164-BA45-30104347E463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A8E5744-F4FB-4D67-9DEA-938FDC66B7FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.6:rc0:*:*:*:*:*:*\",\"matchCriteriaId\":\"80BFA8A6-2EC8-4BD4-BAA8-768246EC277F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC92AA15-22D9-4213-BC7D-C36FBE4B249D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC998D08-61EC-45EE-AC67-41CB2B96BF70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"717F839C-2DDC-4D1F-84EE-8F87F4030904\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66649F13-2EAE-4F76-B21C-585C57921655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBD66FB6-F007-46DA-82B6-5083C75E5C07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D85A1B1-4E94-4F7C-B363-1F8C18999E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF21570D-1EEF-4254-9BF2-8CAE8B408407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"01A59DB6-B292-4040-9945-5ADADFBDFC6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.12:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"41419D41-EE7A-4464-94E7-847BD72EAAE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.12:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E16D7BC-9BCE-4FFD-9289-E7D951DA254A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.12:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"859687C2-C15E-4D6B-B109-39F9AE80397C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.12:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6563B61-601D-4C8A-9572-BD848C3A8313\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D05A27CC-C36F-425A-B72B-8F3DE19D5587\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76857BA7-99D9-489B-8ED5-292DAA083931\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.15:pre0:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4AE268-006A-4EDE-8D2E-3CCD35F8EC7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.15:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F726A16-C432-4679-A904-37C0FE820883\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.15:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"81586EBF-EDFB-42C9-B5E2-BE29B66CE968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.15:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"20E0FB52-1B22-46E5-B83D-D88513A3E314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.15:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D9C76FD-3612-410F-AB14-A36D2C520439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A35CE4-EAA9-4CDB-A54D-79AA844AF279\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F616992-6D50-457F-B699-D0DCA3D46C33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:6.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAE13225-F90F-4ABC-87A0-DBE63E91FC18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mortbay:jetty:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8DF87A1-6CE0-4232-8801-43DE4D0D38E8\"}]}]}],\"references\":[{\"url\":\"http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…