fkie_cve-2011-1521
Vulnerability from fkie_nvd
Published
2011-05-24 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.
References
cve@mitre.orghttp://bugs.python.org/issue11662Patch
cve@mitre.orghttp://hg.python.org/cpython/file/96a6c128822b/Misc/NEWS
cve@mitre.orghttp://hg.python.org/cpython/file/b2934d98dac1/Misc/NEWS
cve@mitre.orghttp://hg.python.org/cpython/rev/96a6c128822b/Patch
cve@mitre.orghttp://hg.python.org/cpython/rev/b2934d98dac1/Patch
cve@mitre.orghttp://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
cve@mitre.orghttp://openwall.com/lists/oss-security/2011/03/24/5
cve@mitre.orghttp://openwall.com/lists/oss-security/2011/03/28/2
cve@mitre.orghttp://openwall.com/lists/oss-security/2011/09/11/1
cve@mitre.orghttp://openwall.com/lists/oss-security/2011/09/13/2
cve@mitre.orghttp://openwall.com/lists/oss-security/2011/09/15/5
cve@mitre.orghttp://secunia.com/advisories/50858
cve@mitre.orghttp://secunia.com/advisories/51024
cve@mitre.orghttp://secunia.com/advisories/51040
cve@mitre.orghttp://securitytracker.com/id?1025488
cve@mitre.orghttp://support.apple.com/kb/HT5002
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:096
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1592-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1596-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1613-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1613-2
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=690560Patch
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=737366
cve@mitre.orghttps://www.djangoproject.com/weblog/2011/sep/09/
cve@mitre.orghttps://www.djangoproject.com/weblog/2011/sep/10/127/
af854a3a-2127-422b-91ae-364da2661108http://bugs.python.org/issue11662Patch
af854a3a-2127-422b-91ae-364da2661108http://hg.python.org/cpython/file/96a6c128822b/Misc/NEWS
af854a3a-2127-422b-91ae-364da2661108http://hg.python.org/cpython/file/b2934d98dac1/Misc/NEWS
af854a3a-2127-422b-91ae-364da2661108http://hg.python.org/cpython/rev/96a6c128822b/Patch
af854a3a-2127-422b-91ae-364da2661108http://hg.python.org/cpython/rev/b2934d98dac1/Patch
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/03/24/5
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/03/28/2
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/09/11/1
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/09/13/2
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/09/15/5
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50858
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51024
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51040
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1025488
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5002
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:096
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1592-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1596-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1613-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1613-2
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=690560Patch
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=737366
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2011/sep/09/
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2011/sep/10/127/
Impacted products
Vendor Product Version
python python 2.0
python python 2.0.1
python python 2.1
python python 2.1.1
python python 2.1.2
python python 2.1.3
python python 2.2
python python 2.2.1
python python 2.2.2
python python 2.2.3
python python 2.3.1
python python 2.3.2
python python 2.3.3
python python 2.3.4
python python 2.3.5
python python 2.3.7
python python 2.4.1
python python 2.4.2
python python 2.4.3
python python 2.4.4
python python 2.4.6
python python 2.5.1
python python 2.5.2
python python 2.5.3
python python 2.5.4
python python 2.6.1
python python 2.6.4
python python 2.6.5
python python 2.6.6
python python 2.6.7
python python 2.7.1
python python 3.0
python python 3.0.1
python python 3.1
python python 3.1.1
python python 3.1.2
python python 3.1.3
python python 3.2
python python 3.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:python:python:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD5A27DB-0113-4DE3-9CA0-0792CC7795AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEB6ED07-C176-496D-B9CA-F24933D71999",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3870A704-5D26-4999-9C49-19AE9E88AAE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A223BB3-DD5A-48C9-9C82-5D1C4F122828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C14973EE-5A2E-4935-8D29-594761502D72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E502388-0A87-4503-8EC9-8A43E8BF43E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9C3C11-0D4F-44AB-BCA0-4963F1BF67DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3CD168A-2180-44C8-8784-3B32589904BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB30EAAD-5CF0-41DD-909B-C6AD94D88ABB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "569FAD3A-17DF-424A-AF93-B0720D48D6B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BD8ED56-5568-4461-B94A-0B5C1EF8C01A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "396FFF60-8F61-43E5-BF0C-A0C319714247",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "75872F94-A537-4E57-8325-3426DB5D6C75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A038A64-E659-47BB-B2C6-8FD151684CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82F7C03-C9D3-4B83-AF74-30981EC25431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "02839080-EFB1-4F63-9D4E-45E26D82ECF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C353D0-C579-4C0B-AD7D-9E56353F2BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB87E45-DBC2-4D0F-B4E9-38585D2F92A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "976E5CD0-3A1E-43E6-9C34-B8F1EE1AB863",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "179EDC23-2328-4BB6-98D5-7C1A975A0C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B6E723-EC9D-44EF-9DB8-8A229E0ABBB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "12D3CD4F-0C58-46F4-939D-FDF19BC98729",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D13FC75-3979-40A8-A1FE-EF86EB15C8A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AE8C3C-53A1-408A-BA23-1EBA1E6A0E4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA59C66F-E469-42C1-9745-330E35AE5A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "244740D0-CACA-4607-964C-F0F46153653D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E852D2C6-D744-4311-97B3-CAEF073D6585",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "845FBD14-4175-49F1-B762-4F550CEF5B0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "84E7646B-BC7C-4ED6-925B-268291F31610",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CD6B328-E333-48C3-B2CC-41EC95321B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CE2063E-5B74-4731-885F-80D2D7B15604",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0C702F-59E0-40AB-BA95-8F0803AB0550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3190C547-7230-476C-A43F-641FE7B891EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "74AC7EE5-F01D-4F28-80D1-4076B7B24BA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B547525-E0DB-4D64-8ED1-AF3F1B6FF65F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19064C18-1CD7-4F10-8065-4B900BB31F83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1997CB6-FD72-4B13-915A-7500AA06F4B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "87845E79-F4A3-4390-9ACF-A14E86BCDB10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:python:3.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "E2C8F3C4-91AB-4AE3-A2FB-A093F97742FD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs."
    },
    {
      "lang": "es",
      "value": "Los m\u00f3dulos urllib y urllib2 en Python v2.x anteriores a v2.7.2 y v3.x anteriores a v3.2.1 procesan los encabezados de ubicaci\u00f3n que especificar la redirecci\u00f3n del fichero: URLs, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes remotos obtener informaci\u00f3n sensible o provocar una denegaci\u00f3n de servicio (consumo de recursos) a trav\u00e9s de una URL manipulada, como lo demuestra lso ficheros URLs: //etc/passwd y //dev/zero."
    }
  ],
  "id": "CVE-2011-1521",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-05-24T23:55:02.840",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.python.org/issue11662"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://hg.python.org/cpython/file/96a6c128822b/Misc/NEWS"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://hg.python.org/cpython/file/b2934d98dac1/Misc/NEWS"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://hg.python.org/cpython/rev/96a6c128822b/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://hg.python.org/cpython/rev/b2934d98dac1/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2011/03/24/5"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2011/03/28/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2011/09/11/1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2011/09/13/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2011/09/15/5"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/50858"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/51024"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/51040"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1025488"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT5002"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:096"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1592-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1596-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1613-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1613-2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690560"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.djangoproject.com/weblog/2011/sep/09/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.python.org/issue11662"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://hg.python.org/cpython/file/96a6c128822b/Misc/NEWS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://hg.python.org/cpython/file/b2934d98dac1/Misc/NEWS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://hg.python.org/cpython/rev/96a6c128822b/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://hg.python.org/cpython/rev/b2934d98dac1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/03/24/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/03/28/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/09/11/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/09/13/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/09/15/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50858"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51040"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1025488"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT5002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:096"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1592-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1596-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1613-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1613-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690560"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.djangoproject.com/weblog/2011/sep/09/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…