fkie_cve-2008-5517
Vulnerability from fkie_nvd
Published
2009-01-13 17:00
Modified
2025-04-09 00:30
Severity ?
Summary
The web interface in git (gitweb) 1.5.x before 1.5.6 allows remote attackers to execute arbitrary commands via shell metacharacters related to (1) git_snapshot and (2) git_object.
References
secalert@redhat.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512330
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2009-01/msg00002.html
secalert@redhat.comhttp://repo.or.cz/w/git.git?a=commitdiff%3Bh=516381d5
secalert@redhat.comhttp://secunia.com/advisories/33964Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/34194Vendor Advisory
secalert@redhat.comhttp://wiki.rpath.com/Advisories:rPSA-2009-0005
secalert@redhat.comhttp://www.debian.org/security/2009/dsa-1708
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200903-15.xml
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2009/01/20/1
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2009/01/21/7
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2009/01/23/2
secalert@redhat.comhttp://www.securityfocus.com/archive/1/500008/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/33215Patch
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-723-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/0175Vendor Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=479715
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-2936
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512330
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://repo.or.cz/w/git.git?a=commitdiff%3Bh=516381d5
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33964Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34194Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/Advisories:rPSA-2009-0005
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1708
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200903-15.xml
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/01/20/1
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/01/21/7
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/01/23/2
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/500008/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/33215Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-723-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0175Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=479715
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2936
Impacted products
Vendor Product Version
git git 1.5.0
git git 1.5.0
git git 1.5.0
git git 1.5.0
git git 1.5.0.1
git git 1.5.0.2
git git 1.5.0.3
git git 1.5.0.4
git git 1.5.0.5
git git 1.5.0.6
git git 1.5.0.7
git git 1.5.1
git git 1.5.1.1
git git 1.5.1.2
git git 1.5.1.3
git git 1.5.1.4
git git 1.5.1.5
git git 1.5.1.6
git git 1.5.2
git git 1.5.2.1
git git 1.5.2.2
git git 1.5.2.3
git git 1.5.2.4
git git 1.5.2.5
git git 1.5.3
git git 1.5.3
git git 1.5.3
git git 1.5.3
git git 1.5.3.1
git git 1.5.3.2
git git 1.5.3.3
git git 1.5.3.4
git git 1.5.3.5
git git 1.5.3.6
git git 1.5.3.7
git git 1.5.3.8
git git 1.5.4
git git 1.5.4
git git 1.5.4
git git 1.5.4
git git 1.5.4
git git 1.5.4
git git 1.5.4
git git 1.5.4
git git 1.5.4.1
git git 1.5.4.2
git git 1.5.4.3
git git 1.5.4.4
git git 1.5.4.5
git git 1.5.4.6
git git 1.5.4.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:git:git:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC291EB-F083-4E66-B61B-50723E0E8A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "0756E43B-F13B-4EB4-89B3-9A7A6CA6DDA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "23E68B79-8E0C-4001-AECD-ED0AF81825B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "6FAC3AF5-D66D-4972-B2C7-9D1CD784884A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BE75459-E53B-4E3A-B94A-3A7DA916A4AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A51E31C-06CD-463F-BF7D-F14979AB492B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D198227B-3B53-4C29-985E-2596C0909A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6347CFA-DC5A-4C0F-A516-02E6BBEDA3AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4474571-24EB-4D53-8A61-D77E560B0ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B6544F7-D835-45C5-9645-AFEA9F264DE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E47006-A44B-4BE1-AD6B-CF869C79A2CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "569F2502-3023-44F6-8767-4DA465B3C754",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CDF10E4-F882-4BD6-AA56-B56CEC28D1DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "909E71D3-A5E4-47AF-B9F4-2A05A4129EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "73FFB1CD-1C79-4DD8-BCAB-1FCA8D99C89B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4124F148-9281-4465-9E16-67DE47E1F00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "22F07209-3FC5-4AA4-B9BF-18F32D7F402F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDEF615E-48FB-4F1E-BC8E-B3A70457D474",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C43D08FF-7871-481D-A648-015F4DCF68E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4869796-F69A-49CC-9203-CE80F38E1A23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03769CFD-3A5F-4C5E-B548-6B8F7EFFDE14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2433A7-3333-407D-8147-9AC736049590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "585B9665-B422-418D-9AEC-65E65D24621B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DA2677B-1237-4D22-A51E-3A67B6AA9F9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D6642BE-13B4-40F8-BFD4-AD1E55B1A3BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.3:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "18962E5D-185E-4AF8-B0B3-11026B61053D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.3:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "2EBCE67F-34AC-4635-A2DF-E0C304FAB8E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.3:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "197F9E88-DE20-44B5-B159-8E7BC3986E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BF65B33-FD2F-4F2B-9F67-360F8957FABC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C668BD7-C4E3-4A12-9987-E565250E2E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3F93314-4F2D-4036-94F7-986B16BEC851",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A161E8-6CB8-40FF-9D90-00664185F69F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9533C06-96BF-4D5D-A29C-F2AD2EE5108C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20EFCED-EC50-4A9B-970B-E29CDBDAABDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC5F7F8-EFC2-4FD0-A293-59F76EBFAE05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "361F32F0-8009-40D2-BC14-74AE90CDB36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B6E65D8-0D8E-4D11-82D7-DD3FB3EB1095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4:rc0:*:*:*:*:*:*",
              "matchCriteriaId": "67535E99-5DD8-4F90-9DB1-5415201E94E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F3163CEC-C0D5-401E-93C3-6A5316630FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4:rc1.1136.g2794:*:*:*:*:*:*",
              "matchCriteriaId": "8DA19E8C-34DE-4721-88E2-B97774E855E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "ED57760D-0C08-43FE-A837-B00D271EDBA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "BA11029F-E4F7-4D4A-817C-A7CC5AD4E872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A42B9B9-7B29-429D-9ABC-736CCC038813",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "456AD412-970D-495E-8F7F-0CF670C364B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63530521-E600-4326-B057-162E6635554B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0715BCFB-5EAA-4812-BB59-7210CB6670FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9BBAA74-B0DE-4388-8C1B-8C3FF258EDD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8CEFC6C-0066-4331-A7A8-02047A19206A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1337EA7C-3E52-47EC-8A32-C61A3B5046A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9D484DA-BCEA-4873-9F8C-883D702644F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:git:git:1.5.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF45A2CE-0E19-477F-9393-B8AAD158D285",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The web interface in git (gitweb) 1.5.x before 1.5.6 allows remote attackers to execute arbitrary commands via shell metacharacters related to (1) git_snapshot and (2) git_object."
    },
    {
      "lang": "es",
      "value": "La interfaz web en git (gitweb) versiones 1.5.x anteriores a 1.5.6, permite a atacantes remotos ejecutar comandos arbitrarios mediante metacaracteres de shell relacionados a (1) git_snapshot y (2) git_object."
    }
  ],
  "id": "CVE-2008-5517",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-01-13T17:00:01.157",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512330"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://repo.or.cz/w/git.git?a=commitdiff%3Bh=516381d5"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/33964"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34194"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0005"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2009/dsa-1708"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-15.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2009/01/20/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2009/01/21/7"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2009/01/23/2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/500008/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/33215"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-723-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0175"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479715"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-2936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512330"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://repo.or.cz/w/git.git?a=commitdiff%3Bh=516381d5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/33964"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34194"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1708"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200903-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/01/20/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/01/21/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/01/23/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/500008/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/33215"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-723-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0175"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-2936"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…