fkie_cve-2009-1934
Vulnerability from fkie_nvd
Published
2009-06-05 16:00
Modified
2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Reverse Proxy Plug-in in Sun Java System Web Server 6.1 before SP11 allows remote attackers to inject arbitrary web script or HTML via the query string in situations that result in a 502 Gateway error.
Impacted products
Vendor Product Version
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun java_system_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp10:aix:*:*:*:*:*",
              "matchCriteriaId": "C432A6A6-E063-49F5-9784-0E34B5F843EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:aix:*:*:*:*:*",
              "matchCriteriaId": "389FD567-59F5-47C3-B000-E916357889DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp5:aix:*:*:*:*:*",
              "matchCriteriaId": "A58B50D0-CBEA-43D5-9537-E9418B13CDA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp6:aix:*:*:*:*:*",
              "matchCriteriaId": "131D4D0F-D73B-434A-845E-9788EE48915B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp7:aix:*:*:*:*:*",
              "matchCriteriaId": "698DCBEF-41C5-474E-BE60-0BC285A89B18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp8:aix:*:*:*:*:*",
              "matchCriteriaId": "D0518BE3-1E9A-4974-9805-E70CB95ADC40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp9:aix:*:*:*:*:*",
              "matchCriteriaId": "A53CE597-7827-4BDD-A922-23829485A1E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:*:aix:*:*:*:*:*",
              "matchCriteriaId": "566250FE-D1E1-43CE-9255-99B8AC1FD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp1:aix:*:*:*:*:*",
              "matchCriteriaId": "9A6494E5-72D1-43E0-ABEE-16D23D167801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp2:aix:*:*:*:*:*",
              "matchCriteriaId": "1AD96005-4158-4962-BD8E-3CED7CF3E900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp3:aix:*:*:*:*:*",
              "matchCriteriaId": "725A8D67-7742-4BE2-AADE-E76BC880A9E3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp10:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "43511DA8-A07B-4927-9FB2-CF2429BC50C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "F84E3EFA-4013-4538-A32B-59B4EE874D4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp5:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "2E956D83-8463-4A5C-9D7F-CED9A43E3C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp6:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "84E5E3A8-1938-4CB4-9673-196F4E6D37C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp7:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "E2281A43-3C8D-470F-8F95-B63AA5F27BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp8:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "98952019-7F68-4A6B-810C-829A82A472E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp9:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "4E3A50B8-050E-401E-8B7C-700B3B478FFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:*:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "92F78B4D-89AC-4941-9E32-8FD21F3DC9C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp1:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "B80D8913-987A-4316-BC53-16236B4356F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp2:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "3E69834C-A381-4AC6-B42E-F19E199D5A93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp3:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "57A273B7-CDB6-4F47-AFE3-3864DCC01E4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp10:linux:*:*:*:*:*",
              "matchCriteriaId": "99520DA9-10F0-43E8-8A77-2FDA676922C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:linux:*:*:*:*:*",
              "matchCriteriaId": "5165C493-78EC-44FC-9401-4BC9BB4D857B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp5:linux:*:*:*:*:*",
              "matchCriteriaId": "7A4F803A-14B6-47FB-92C6-7E4BE435A2C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp6:linux:*:*:*:*:*",
              "matchCriteriaId": "7276CA8E-4DEC-4B84-8D3B-1F59AE192987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp7:linux:*:*:*:*:*",
              "matchCriteriaId": "9CE812CB-48A5-44AB-AB92-420C1F9B8396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp8:linux:*:*:*:*:*",
              "matchCriteriaId": "8C227B78-F34D-48B3-B150-EA91B6CA74FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp9:linux:*:*:*:*:*",
              "matchCriteriaId": "1004FBF0-AD2A-45A0-A4D7-E24EFC41A558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "88A61895-37FC-462F-928D-65BF02A0676D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp1:linux:*:*:*:*:*",
              "matchCriteriaId": "DE360D60-0894-4E3F-AE2A-A135C4382D3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp2:linux:*:*:*:*:*",
              "matchCriteriaId": "361DF0F9-1808-495E-8189-BFBC3AD082F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp3:linux:*:*:*:*:*",
              "matchCriteriaId": "2DD5222B-BFF5-4FFF-BD91-5B2CBDE14312",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp10:windows:*:*:*:*:*",
              "matchCriteriaId": "A7BDC9E6-87C4-4AE1-AEAD-518CCFF853E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:windows:*:*:*:*:*",
              "matchCriteriaId": "A018481B-EB48-4C4E-A1E4-324DCC437441",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp5:windows:*:*:*:*:*",
              "matchCriteriaId": "B0FEC983-91A6-4708-8308-B77B0FD2D9DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp6:windows:*:*:*:*:*",
              "matchCriteriaId": "431D609A-AA61-4C7C-8F4A-8B01DB2E32E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp7:windows:*:*:*:*:*",
              "matchCriteriaId": "37CBE122-47ED-4659-B15A-55FAF15BA63C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp8:windows:*:*:*:*:*",
              "matchCriteriaId": "E3866A08-0CFA-473D-BBE5-4736282A6446",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp9:windows:*:*:*:*:*",
              "matchCriteriaId": "4541C58C-45F1-4F17-82B9-E33BE693D8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:*:windows:*:*:*:*:*",
              "matchCriteriaId": "3B3825DF-E190-4B15-8160-CAFACDDE7686",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp1:windows:*:*:*:*:*",
              "matchCriteriaId": "91B10E76-4D66-42B2-BC3B-86F158078CAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp2:windows:*:*:*:*:*",
              "matchCriteriaId": "D2311610-C676-4F41-8F64-224C074C8295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp3:windows:*:*:*:*:*",
              "matchCriteriaId": "A3C45222-B840-446B-ADF3-08C09A8B52CE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp10:sparc:*:*:*:*:*",
              "matchCriteriaId": "A280F4D8-13D9-407B-A5C7-E85D7E83A142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:sparc:*:*:*:*:*",
              "matchCriteriaId": "348671B8-279F-426B-A00B-5948297EDFFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp5:sparc:*:*:*:*:*",
              "matchCriteriaId": "45088B1A-D4C7-4FA9-AE39-5B0D2941A8AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp6:sparc:*:*:*:*:*",
              "matchCriteriaId": "55BC4F3F-51D0-432A-96D5-65C7599F9832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp7:sparc:*:*:*:*:*",
              "matchCriteriaId": "C434356D-DAB3-4B78-B1D2-AEB8EC69CE32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp8:sparc:*:*:*:*:*",
              "matchCriteriaId": "300FA553-5FE3-4036-B80B-C4806C865660",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp9:sparc:*:*:*:*:*",
              "matchCriteriaId": "D35923A0-BF2C-400F-BE43-A13B67E4ED89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "4DB66630-4A2A-44F2-971C-3B353F687868",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp1:sparc:*:*:*:*:*",
              "matchCriteriaId": "CB79BECF-1413-438F-9741-CC3BE256E1C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp2:sparc:*:*:*:*:*",
              "matchCriteriaId": "ACAFC237-58BC-4CB1-948C-A2D9B3742809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp3:sparc:*:*:*:*:*",
              "matchCriteriaId": "4B0293BA-6694-4FD0-93FE-7F674AA2A604",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp10:x86:*:*:*:*:*",
              "matchCriteriaId": "80CB7673-2A98-434B-99A3-24DB4686CDE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:x86:*:*:*:*:*",
              "matchCriteriaId": "6BBCB1B9-965D-41C9-81A4-A7470AE46D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp48:x86:*:*:*:*:*",
              "matchCriteriaId": "B2F944E7-F894-42D8-8167-BCC2DEE10BC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp5:x86:*:*:*:*:*",
              "matchCriteriaId": "09FB3270-1242-4EE9-86B7-7B841DEF2533",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp6:x86:*:*:*:*:*",
              "matchCriteriaId": "70901AC0-E2E5-4C8C-B903-105AF7528D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp7:x86:*:*:*:*:*",
              "matchCriteriaId": "440814EC-4215-4ACB-912F-DA75C5CD1AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp9:x86:*:*:*:*:*",
              "matchCriteriaId": "17466643-0B26-4D65-B2FD-C958D906BE91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:*:x86:*:*:*:*:*",
              "matchCriteriaId": "DF9C742B-C0C4-46D5-A7DA-025852069BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp1:x86:*:*:*:*:*",
              "matchCriteriaId": "3378607F-5EF7-4C11-8254-6A44A03B8BC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp2:x86:*:*:*:*:*",
              "matchCriteriaId": "7ACFC436-5A5C-4E31-957F-ED5127ECDB02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp3:x86:*:*:*:*:*",
              "matchCriteriaId": "D5E51FAA-1DD4-478F-B439-D344C33AE355",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Reverse Proxy Plug-in in Sun Java System Web Server 6.1 before SP11 allows remote attackers to inject arbitrary web script or HTML via the query string in situations that result in a 502 Gateway error."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Reverse Proxy Plug-in en Sun Java System Web Server v6.1 anterior a SP11, permite a atacantes remotos la inyecci\u00f3n de c\u00f3digo web y HTML de su elecci\u00f3n a trav\u00e9s de una consulta de cadena en situaciones resultantes de un error \"502 Gateway\"."
    }
  ],
  "id": "CVE-2009-1934",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-06-05T16:00:00.343",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/54872"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35338"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-116648-23-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259588-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-211.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/35204"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1022334"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2009/1500"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50951"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/54872"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35338"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-116648-23-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259588-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-211.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/35204"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1022334"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/1500"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50951"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…