CVE-2011-1841 (GCVE-0-2011-1841)
Vulnerability from cvelistv5
Published
2011-05-03 00:03
Modified
2024-08-06 22:37
Severity ?
CWE
  • n/a
Summary
Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.850Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
          },
          {
            "name": "mojolicious-linktohelper-xss(67257)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67257"
          },
          {
            "name": "47713",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47713"
          },
          {
            "name": "DSA-2239",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2239"
          },
          {
            "name": "FEDORA-2011-6465",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060122.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
        },
        {
          "name": "mojolicious-linktohelper-xss(67257)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67257"
        },
        {
          "name": "47713",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47713"
        },
        {
          "name": "DSA-2239",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2239"
        },
        {
          "name": "FEDORA-2011-6465",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060122.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1841",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes",
              "refsource": "CONFIRM",
              "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
            },
            {
              "name": "mojolicious-linktohelper-xss(67257)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67257"
            },
            {
              "name": "47713",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47713"
            },
            {
              "name": "DSA-2239",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2239"
            },
            {
              "name": "FEDORA-2011-6465",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060122.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1841",
    "datePublished": "2011-05-03T00:03:00",
    "dateReserved": "2011-05-02T00:00:00",
    "dateUpdated": "2024-08-06T22:37:25.850Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-1841\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-05-03T00:55:01.030\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en la ayuda de link_to en Mojolicious en versiones anteriores a v1.12 , permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de par\u00e1metros sin especificar\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.11\",\"matchCriteriaId\":\"2175D9E0-1851-4C06-85F5-A316C80F6C1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"083A2DA9-38BB-4AF8-9FF0-41101E830A0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2C11EC7-D91E-4F65-9C8A-801C724EDBBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC33620B-2B78-4221-8067-15E8BC56865A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69AC00B5-717B-4F7F-AD25-9754BEFD7221\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2E2469A-BE25-4D18-8E7D-F709DCB86FCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02BB8742-9D5C-4831-BD2F-A24505B8E4C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82CA1476-123D-44D5-A1E8-D9C58F6D9949\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479781F2-9614-4552-AE39-12AC41ABB3AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78D1279D-333D-4338-B4ED-07BB1900FB0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D21184D-8823-4162-961D-8A7856557786\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"538FC292-B6BF-4551-AE44-259E0B61B680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"574F7A7C-3986-401D-A58F-6C8F7D922002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDACD094-8117-460E-B7D1-E63EC00B97A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8006:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6965DAA1-FDD8-484B-873A-F6D13227FAD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8007:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9865E142-BB29-4718-BD85-F40E185BF31E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8008:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F667C15-3C89-49CD-800D-303A2677FC36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.8009:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B301544-A38F-417C-BB94-E7711F8ED7C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.9001:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADEBDEB2-3070-4633-A934-DDF49CBD10C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.9002:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5875A25D-CC0E-43CF-B617-CEA99C65A52A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991231:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8C04B9B-DEA3-4161-8E6C-BBBBE9AF5444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991232:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5F9699-7B1B-4356-B0EB-C942888AFEE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991233:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A041B8EB-AD9E-452B-9A2E-22DBCD5CB091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991234:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BE7A136-3975-400A-AB77-4BCD4669553A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991235:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE628F19-D7C9-4E6D-BDC4-5C82CDE540E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991236:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26803A52-EAEC-4CD6-BB89-F1EF40B3021F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991237:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7BC4454-3168-420B-9136-21FD18571526\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991238:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A346280F-BA80-4FBA-BD15-6CA7A1ED8D8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991239:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0376F10-8493-498D-9B5D-76AFE0F4417A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991240:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69293BBF-7788-4462-AA6F-9D3A084D1B3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991241:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31F30FA3-69EC-45B3-8AF5-852DB73756A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991242:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B88557E4-C793-4F6A-A3AE-07799B212ECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991243:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F88C231-60FE-42F3-87E9-23E88ADC7650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991244:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD65F43C-98A9-46A1-BCC4-79ACB5F5C6B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991245:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A9F1C7-1C0A-42B1-91D3-676E03E64BB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991246:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A886B4DC-30E9-4C41-A79A-96F309F343F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991250:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C28AEC3C-20F0-4BFB-B7B6-30336C631400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.991251:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D0521BF-A66D-4663-83C6-49E650454ED5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999901:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C95BB3D-774C-4C71-9A3A-15938BA5CF6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999902:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B583B413-4B8E-4FA3-9CD1-A650CEAB9449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999903:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDC7A6F1-BD38-4119-B5A7-56A50EC6C9C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999904:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DEFF843-57F4-4553-ABD3-7269A32A6DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999905:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8A7C4E6-5E3E-43CB-8F54-4AA5563EA98C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999906:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6CB9879-D8B4-45CA-BF63-D4681C403818\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999907:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66EE203A-CFB1-4317-879D-E6A44F063F66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999908:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7978FDA-7622-4041-BE9E-28F99A1FB16E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999909:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0975B5B-5409-42F5-A50F-644A80F3E5F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999910:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69AB9069-49F9-43B5-9F0F-04BBB145FD7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999911:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77CA7A3A-254D-4154-8AFB-FA7BC4EB286A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999912:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FA8D9CE-BD9E-4BD2-B38C-909CCE0D3842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999913:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DABFC81-F44C-46AB-B9CD-D35624F5071A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999914:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8BDB83-641B-4858-B00A-EEFC9F583050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999920:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D010713B-DE3E-4E76-8299-FF50D19ADA45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999921:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92B83ECE-5D7C-417D-9957-976ECE8E2308\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999922:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59E2E6AF-11DD-4C51-A84F-129D160ACAFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999923:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9590109-8DFC-4E78-B678-8456A0621C08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999924:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FD1031-0C3D-45F1-BFD9-823C6D4B69F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999925:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44059C1E-CDC6-4B75-92CC-CD45C5063F9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999926:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6278FC7E-6852-46B1-9F38-58847391B2F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999927:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88FDE0AA-B353-4CD8-BC9D-DFC709031FF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999928:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CABDE1E8-17E9-4EF5-91C7-9688B0F49AE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999929:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66454D2F-C566-4F3D-AF78-C3FE75A6C62D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999930:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83E28BE4-60FE-46E9-8AA4-45B14A34E2CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999931:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"914475F6-3C2F-4D15-8017-588763BF37E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999932:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12806A34-36FA-4B19-B84E-7385A8EDB302\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999933:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAB41DB0-C61F-441F-A8C7-624845EE39ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999934:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3762061D-FCC3-43EE-BC73-1BEF6BBC8980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999935:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FE3BAE8-B78E-490E-90A7-8DF957D9CA7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999936:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C347C9AE-D2AA-4440-B506-1B692C7C52CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999937:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62704DAC-BFE8-4D27-9F2E-FB8D70E43063\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999938:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C3E1157-11FB-45FA-8E4A-53A3614B335D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999939:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9674613-3BDB-471E-A109-83FF1463FCAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999940:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB59D0D0-E453-4700-9A96-9A452E5C90E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999941:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5A3B80D-8BD9-4F01-AAA8-B50CB3084E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:0.999950:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBCB14A8-635D-4652-9F76-E718F60D0FC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FD46D41-AE54-4223-A659-7E21EC0EC6A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"393D68B4-0E53-4973-80FF-F57CC470E16B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mojolicious:mojolicious:1.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"151552D1-9D07-4424-863B-FC1948619799\"}]}]}],\"references\":[{\"url\":\"http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060122.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2239\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/47713\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/67257\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060122.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2239\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/47713\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/67257\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…