fkie_cve-2011-1841
Vulnerability from fkie_nvd
Published
2011-05-03 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
mojolicious mojolicious *
mojolicious mojolicious 0.2
mojolicious mojolicious 0.3
mojolicious mojolicious 0.4
mojolicious mojolicious 0.5
mojolicious mojolicious 0.6
mojolicious mojolicious 0.7
mojolicious mojolicious 0.8
mojolicious mojolicious 0.8.1
mojolicious mojolicious 0.8.2
mojolicious mojolicious 0.8.3
mojolicious mojolicious 0.8.4
mojolicious mojolicious 0.8.5
mojolicious mojolicious 0.9
mojolicious mojolicious 0.8006
mojolicious mojolicious 0.8007
mojolicious mojolicious 0.8008
mojolicious mojolicious 0.8009
mojolicious mojolicious 0.9001
mojolicious mojolicious 0.9002
mojolicious mojolicious 0.991231
mojolicious mojolicious 0.991232
mojolicious mojolicious 0.991233
mojolicious mojolicious 0.991234
mojolicious mojolicious 0.991235
mojolicious mojolicious 0.991236
mojolicious mojolicious 0.991237
mojolicious mojolicious 0.991238
mojolicious mojolicious 0.991239
mojolicious mojolicious 0.991240
mojolicious mojolicious 0.991241
mojolicious mojolicious 0.991242
mojolicious mojolicious 0.991243
mojolicious mojolicious 0.991244
mojolicious mojolicious 0.991245
mojolicious mojolicious 0.991246
mojolicious mojolicious 0.991250
mojolicious mojolicious 0.991251
mojolicious mojolicious 0.999901
mojolicious mojolicious 0.999902
mojolicious mojolicious 0.999903
mojolicious mojolicious 0.999904
mojolicious mojolicious 0.999905
mojolicious mojolicious 0.999906
mojolicious mojolicious 0.999907
mojolicious mojolicious 0.999908
mojolicious mojolicious 0.999909
mojolicious mojolicious 0.999910
mojolicious mojolicious 0.999911
mojolicious mojolicious 0.999912
mojolicious mojolicious 0.999913
mojolicious mojolicious 0.999914
mojolicious mojolicious 0.999920
mojolicious mojolicious 0.999921
mojolicious mojolicious 0.999922
mojolicious mojolicious 0.999923
mojolicious mojolicious 0.999924
mojolicious mojolicious 0.999925
mojolicious mojolicious 0.999926
mojolicious mojolicious 0.999927
mojolicious mojolicious 0.999928
mojolicious mojolicious 0.999929
mojolicious mojolicious 0.999930
mojolicious mojolicious 0.999931
mojolicious mojolicious 0.999932
mojolicious mojolicious 0.999933
mojolicious mojolicious 0.999934
mojolicious mojolicious 0.999935
mojolicious mojolicious 0.999936
mojolicious mojolicious 0.999937
mojolicious mojolicious 0.999938
mojolicious mojolicious 0.999939
mojolicious mojolicious 0.999940
mojolicious mojolicious 0.999941
mojolicious mojolicious 0.999950
mojolicious mojolicious 1.0
mojolicious mojolicious 1.1
mojolicious mojolicious 1.01



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2175D9E0-1851-4C06-85F5-A316C80F6C1A",
              "versionEndIncluding": "1.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "083A2DA9-38BB-4AF8-9FF0-41101E830A0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C11EC7-D91E-4F65-9C8A-801C724EDBBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33620B-2B78-4221-8067-15E8BC56865A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "69AC00B5-717B-4F7F-AD25-9754BEFD7221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2E2469A-BE25-4D18-8E7D-F709DCB86FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "02BB8742-9D5C-4831-BD2F-A24505B8E4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "82CA1476-123D-44D5-A1E8-D9C58F6D9949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "479781F2-9614-4552-AE39-12AC41ABB3AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D1279D-333D-4338-B4ED-07BB1900FB0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D21184D-8823-4162-961D-8A7856557786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "538FC292-B6BF-4551-AE44-259E0B61B680",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "574F7A7C-3986-401D-A58F-6C8F7D922002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDACD094-8117-460E-B7D1-E63EC00B97A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8006:*:*:*:*:*:*:*",
              "matchCriteriaId": "6965DAA1-FDD8-484B-873A-F6D13227FAD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8007:*:*:*:*:*:*:*",
              "matchCriteriaId": "9865E142-BB29-4718-BD85-F40E185BF31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8008:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F667C15-3C89-49CD-800D-303A2677FC36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8009:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B301544-A38F-417C-BB94-E7711F8ED7C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9001:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADEBDEB2-3070-4633-A934-DDF49CBD10C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9002:*:*:*:*:*:*:*",
              "matchCriteriaId": "5875A25D-CC0E-43CF-B617-CEA99C65A52A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991231:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8C04B9B-DEA3-4161-8E6C-BBBBE9AF5444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991232:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5F9699-7B1B-4356-B0EB-C942888AFEE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991233:*:*:*:*:*:*:*",
              "matchCriteriaId": "A041B8EB-AD9E-452B-9A2E-22DBCD5CB091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991234:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BE7A136-3975-400A-AB77-4BCD4669553A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991235:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE628F19-D7C9-4E6D-BDC4-5C82CDE540E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991236:*:*:*:*:*:*:*",
              "matchCriteriaId": "26803A52-EAEC-4CD6-BB89-F1EF40B3021F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991237:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BC4454-3168-420B-9136-21FD18571526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991238:*:*:*:*:*:*:*",
              "matchCriteriaId": "A346280F-BA80-4FBA-BD15-6CA7A1ED8D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991239:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0376F10-8493-498D-9B5D-76AFE0F4417A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991240:*:*:*:*:*:*:*",
              "matchCriteriaId": "69293BBF-7788-4462-AA6F-9D3A084D1B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991241:*:*:*:*:*:*:*",
              "matchCriteriaId": "31F30FA3-69EC-45B3-8AF5-852DB73756A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991242:*:*:*:*:*:*:*",
              "matchCriteriaId": "B88557E4-C793-4F6A-A3AE-07799B212ECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991243:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F88C231-60FE-42F3-87E9-23E88ADC7650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991244:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD65F43C-98A9-46A1-BCC4-79ACB5F5C6B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991245:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A9F1C7-1C0A-42B1-91D3-676E03E64BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991246:*:*:*:*:*:*:*",
              "matchCriteriaId": "A886B4DC-30E9-4C41-A79A-96F309F343F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991250:*:*:*:*:*:*:*",
              "matchCriteriaId": "C28AEC3C-20F0-4BFB-B7B6-30336C631400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991251:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0521BF-A66D-4663-83C6-49E650454ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999901:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C95BB3D-774C-4C71-9A3A-15938BA5CF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999902:*:*:*:*:*:*:*",
              "matchCriteriaId": "B583B413-4B8E-4FA3-9CD1-A650CEAB9449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999903:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC7A6F1-BD38-4119-B5A7-56A50EC6C9C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999904:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DEFF843-57F4-4553-ABD3-7269A32A6DE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999905:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8A7C4E6-5E3E-43CB-8F54-4AA5563EA98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999906:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6CB9879-D8B4-45CA-BF63-D4681C403818",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999907:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EE203A-CFB1-4317-879D-E6A44F063F66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999908:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7978FDA-7622-4041-BE9E-28F99A1FB16E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999909:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0975B5B-5409-42F5-A50F-644A80F3E5F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999910:*:*:*:*:*:*:*",
              "matchCriteriaId": "69AB9069-49F9-43B5-9F0F-04BBB145FD7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999911:*:*:*:*:*:*:*",
              "matchCriteriaId": "77CA7A3A-254D-4154-8AFB-FA7BC4EB286A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999912:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FA8D9CE-BD9E-4BD2-B38C-909CCE0D3842",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999913:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DABFC81-F44C-46AB-B9CD-D35624F5071A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999914:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE8BDB83-641B-4858-B00A-EEFC9F583050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999920:*:*:*:*:*:*:*",
              "matchCriteriaId": "D010713B-DE3E-4E76-8299-FF50D19ADA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999921:*:*:*:*:*:*:*",
              "matchCriteriaId": "92B83ECE-5D7C-417D-9957-976ECE8E2308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999922:*:*:*:*:*:*:*",
              "matchCriteriaId": "59E2E6AF-11DD-4C51-A84F-129D160ACAFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999923:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9590109-8DFC-4E78-B678-8456A0621C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999924:*:*:*:*:*:*:*",
              "matchCriteriaId": "03FD1031-0C3D-45F1-BFD9-823C6D4B69F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999925:*:*:*:*:*:*:*",
              "matchCriteriaId": "44059C1E-CDC6-4B75-92CC-CD45C5063F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999926:*:*:*:*:*:*:*",
              "matchCriteriaId": "6278FC7E-6852-46B1-9F38-58847391B2F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999927:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FDE0AA-B353-4CD8-BC9D-DFC709031FF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999928:*:*:*:*:*:*:*",
              "matchCriteriaId": "CABDE1E8-17E9-4EF5-91C7-9688B0F49AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999929:*:*:*:*:*:*:*",
              "matchCriteriaId": "66454D2F-C566-4F3D-AF78-C3FE75A6C62D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999930:*:*:*:*:*:*:*",
              "matchCriteriaId": "83E28BE4-60FE-46E9-8AA4-45B14A34E2CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999931:*:*:*:*:*:*:*",
              "matchCriteriaId": "914475F6-3C2F-4D15-8017-588763BF37E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999932:*:*:*:*:*:*:*",
              "matchCriteriaId": "12806A34-36FA-4B19-B84E-7385A8EDB302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999933:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAB41DB0-C61F-441F-A8C7-624845EE39ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999934:*:*:*:*:*:*:*",
              "matchCriteriaId": "3762061D-FCC3-43EE-BC73-1BEF6BBC8980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999935:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FE3BAE8-B78E-490E-90A7-8DF957D9CA7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999936:*:*:*:*:*:*:*",
              "matchCriteriaId": "C347C9AE-D2AA-4440-B506-1B692C7C52CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999937:*:*:*:*:*:*:*",
              "matchCriteriaId": "62704DAC-BFE8-4D27-9F2E-FB8D70E43063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999938:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C3E1157-11FB-45FA-8E4A-53A3614B335D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999939:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9674613-3BDB-471E-A109-83FF1463FCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999940:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB59D0D0-E453-4700-9A96-9A452E5C90E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999941:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A3B80D-8BD9-4F01-AAA8-B50CB3084E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999950:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCB14A8-635D-4652-9F76-E718F60D0FC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD46D41-AE54-4223-A659-7E21EC0EC6A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "393D68B4-0E53-4973-80FF-F57CC470E16B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "151552D1-9D07-4424-863B-FC1948619799",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en la ayuda de link_to en Mojolicious en versiones anteriores a v1.12 , permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de par\u00e1metros sin especificar\r\n"
    }
  ],
  "id": "CVE-2011-1841",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-05-03T00:55:01.030",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060122.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2239"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/47713"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060122.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/47713"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67257"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…