fkie_cve-2011-2746
Vulnerability from fkie_nvd
Published
2011-08-29 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in Kernel/Modules/AdminPackageManager.pm in OTRS-Core in Open Ticket Request System (OTRS) 2.x before 2.4.11 and 3.x before 3.0.10 allows remote authenticated administrators to read arbitrary files via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
otrs | otrs | 2.0.0 | |
otrs | otrs | 2.0.0 | |
otrs | otrs | 2.0.0 | |
otrs | otrs | 2.0.0 | |
otrs | otrs | 2.0.0 | |
otrs | otrs | 2.0.0 | |
otrs | otrs | 2.0.1 | |
otrs | otrs | 2.0.2 | |
otrs | otrs | 2.0.3 | |
otrs | otrs | 2.0.4 | |
otrs | otrs | 2.0.5 | |
otrs | otrs | 2.1.0 | |
otrs | otrs | 2.1.0 | |
otrs | otrs | 2.1.1 | |
otrs | otrs | 2.1.2 | |
otrs | otrs | 2.1.3 | |
otrs | otrs | 2.1.4 | |
otrs | otrs | 2.1.5 | |
otrs | otrs | 2.1.6 | |
otrs | otrs | 2.1.7 | |
otrs | otrs | 2.1.8 | |
otrs | otrs | 2.1.9 | |
otrs | otrs | 2.2.0 | |
otrs | otrs | 2.2.0 | |
otrs | otrs | 2.2.0 | |
otrs | otrs | 2.2.0 | |
otrs | otrs | 2.2.0 | |
otrs | otrs | 2.2.1 | |
otrs | otrs | 2.2.2 | |
otrs | otrs | 2.2.3 | |
otrs | otrs | 2.2.4 | |
otrs | otrs | 2.2.5 | |
otrs | otrs | 2.2.6 | |
otrs | otrs | 2.2.7 | |
otrs | otrs | 2.2.8 | |
otrs | otrs | 2.2.9 | |
otrs | otrs | 2.3.0 | |
otrs | otrs | 2.3.0 | |
otrs | otrs | 2.3.0 | |
otrs | otrs | 2.3.0 | |
otrs | otrs | 2.3.0 | |
otrs | otrs | 2.3.1 | |
otrs | otrs | 2.3.2 | |
otrs | otrs | 2.3.3 | |
otrs | otrs | 2.3.4 | |
otrs | otrs | 2.3.5 | |
otrs | otrs | 2.3.6 | |
otrs | otrs | 2.4.0 | |
otrs | otrs | 2.4.0 | |
otrs | otrs | 2.4.0 | |
otrs | otrs | 2.4.0 | |
otrs | otrs | 2.4.0 | |
otrs | otrs | 2.4.0 | |
otrs | otrs | 2.4.1 | |
otrs | otrs | 2.4.2 | |
otrs | otrs | 2.4.3 | |
otrs | otrs | 2.4.4 | |
otrs | otrs | 2.4.5 | |
otrs | otrs | 2.4.6 | |
otrs | otrs | 2.4.7 | |
otrs | otrs | 2.4.8 | |
otrs | otrs | 2.4.9 | |
otrs | otrs | 2.4.10 | |
otrs | otrs | 3.0.0 | |
otrs | otrs | 3.0.0 | |
otrs | otrs | 3.0.0 | |
otrs | otrs | 3.0.0 | |
otrs | otrs | 3.0.0 | |
otrs | otrs | 3.0.0 | |
otrs | otrs | 3.0.0 | |
otrs | otrs | 3.0.1 | |
otrs | otrs | 3.0.2 | |
otrs | otrs | 3.0.3 | |
otrs | otrs | 3.0.4 | |
otrs | otrs | 3.0.5 | |
otrs | otrs | 3.0.6 | |
otrs | otrs | 3.0.7 | |
otrs | otrs | 3.0.8 | |
otrs | otrs | 3.0.9 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:otrs:otrs:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A777AA53-6900-483D-8C31-F9C415DE9B2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "53949C54-F416-46C6-A784-441880F0D8E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "2896D75B-07EC-4224-9018-0BF55DE16379", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "A6607C7B-E121-4DCD-8FA0-5B202B97D624", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "4FBA783C-32B5-4264-9701-3843710499E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "1EB26560-C681-436F-9F41-D927C501791E", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "49CBB470-37A6-4D09-BA71-8EAB8931554E", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CF1D725C-CBE6-49A4-B6FC-3D80E35E0135", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "63608BED-2700-4EF7-9038-B295FF373FD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5386B686-3421-4F4E-AC5E-6567FE12E03B", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "0E712714-6E03-43BA-B375-929638730B44", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.1.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "12B1D7F7-51C3-460E-BDE3-0C40B692B622", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.1.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EF9AEA70-9DC8-41B5-A4D4-F86828F9E35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E7BAB384-AC74-4D75-BFE2-8CBC2C0A830F", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "E365F79A-BDDA-430D-B39F-FADADA91A0F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "DC9223D9-B5F8-4D9A-98F8-5D73852B2E0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "BC91C532-9CCD-4353-A6C3-E297A1F5BD77", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "6BAAB79E-8DC5-4BFF-9BD2-9215DA2B775D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "E9C7B601-0CBD-4861-855E-A4F64157A8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "B715EC14-D79A-4CB4-A875-380F66A45C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "20C9C4DB-4E5D-4D01-B174-D6682831B184", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "6D25611D-231B-4CBA-8DC3-5F6CE90ADA56", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.2.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "01E9FF1B-AFFE-43C1-8E06-15DA8564D62F", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.2.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "ACE6A6EB-7264-4AE8-8CC4-994969E8B136", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.2.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "FEEFDE04-B409-47BF-BF71-0C87A7A6893D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.2.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "7ECC731E-7B47-4AAA-B009-E8CE73AE354A", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DADC404F-08B0-48A7-84DB-5270B8E1A147", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "091E423C-A9D5-4ED8-93C7-5CDD57DC3B00", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAEC4E93-34C5-418B-B12C-CABE500D5171", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "75BE131A-342E-475C-9522-E53A8A8A1BA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF62E279-212F-40B4-B2B3-429D6A6164BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "D6FEFC32-3880-4CEA-9AD1-B1669A3CACE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A0A9CD5E-655A-423B-805B-8953122D2509", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "64BCF69B-4DB6-423E-BCE9-7CAEA74B1568", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "9307C840-9EEE-4A23-8FAF-258D683E14A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "2A6F2752-5D88-4007-96C8-DFA1697B0AC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.3.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "29823A84-ACC0-410F-B2A5-C659C8F06625", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.3.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "2BC10A3E-F32A-4A16-BDD2-930ADB973693", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.3.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "1D368E58-79AD-4C55-B867-A75FF3F98DE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.3.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "8AAF73C6-FCCE-43C7-BD67-F8CFC4EA3A32", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "09EF0162-5102-4F95-82CF-DF541B50858D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "55F536B9-11F6-4F3F-9293-25D23F987C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DF09D-A8D8-4C77-A4C9-46BD570C2CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "D7ECE7F6-7A82-420C-A440-522331667B43", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "6C66917F-135E-464E-916F-FD6B5A701E65", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "C0002581-086A-4CB7-9408-8FA52BD03D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "B9999856-A8BD-43D3-88D4-FADEB44D0B3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "0B392055-8F04-4D66-9E34-18E08014E075", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "56956C8B-A529-4B2C-93B1-2E5B857E104B", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "6EA6E59E-9A98-4DB8-8289-4C3D05ECCE6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "46E37D9A-107B-4FBA-8371-5E9C1B029CA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "CF0E2F18-CD50-4A71-8291-76502AFAC579", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "10F06ECD-C5FF-4912-9EDC-6C9A937CD844", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "724A9C40-AE96-4AD5-BEB2-6C496F4C361D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "8AA5A554-016E-4CFB-A809-991B6902C3FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3821A8EF-ED18-49DD-BF52-DFDD982E35C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B41C77DB-BC99-4C50-BD86-FECB44ACF0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "C9D7CBCB-F4B8-4ACC-86C8-E45358F48697", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "CB4EAE42-96BD-4B25-BFCC-6CFBF08F339C", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "A07A35A7-55A5-4E78-98F8-38B1F3D4DA72", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "73932047-8E00-4720-875A-7D414000F23F", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "E9EB62C2-23EF-4B4F-9A68-DD1388E94E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "ED6D3CC0-ED21-4BE5-989A-977FB267FED6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:otrs:otrs:3.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "3FC9D47F-8774-47F5-AC8C-97CBA9879D09", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "E501F8E9-3453-428A-AEDF-861A1FF09E3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "E7834A4F-255F-48E3-B363-452E8CEE1D2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "EFAB601C-F7CC-49F7-8FC0-8D76360AE237", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "DB57DF5E-C8A1-454C-A9EE-6BF486E74E54", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "47321F77-7019-46F9-B4E6-7490CD8F83C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "BC1AC1FB-87D5-457D-BFC4-4C6676950F20", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "480A5F3B-B1BC-4D66-9B86-424877BE8670", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "46F47052-E465-4230-B59E-C7463C649A4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "8694775A-9CE7-4E09-9C6E-9D3B26923513", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "01D3250B-2CE8-4C03-AB04-02A3D1EF72E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "666FB4D7-9917-4BAD-AD34-911FB315E1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "45326D85-EC87-4C3F-84FD-2A6FA4926F17", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9DB3159B-EF44-4D18-A4E9-EE149F588BEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "5F879541-066F-4C86-8844-B577EA8F2661", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8C40A021-28B3-4358-951F-86F791A9655A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Kernel/Modules/AdminPackageManager.pm in OTRS-Core in Open Ticket Request System (OTRS) 2.x before 2.4.11 and 3.x before 3.0.10 allows remote authenticated administrators to read arbitrary files via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en Kernel/Modules/AdminPackageManager.pm en OTRS-Core en Open Ticket Request System (OTRS) v2.x antes de v2.4.11 y v3.x antes de v3.0.10. permite a administradores autenticados remotamente leer archivos de su elecci\u00f3n a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2011-2746", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-29T15:55:01.517", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2011-09/msg00011.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://otrs.org/advisory/OSA-2011-03-en/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45701" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/45894" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/74602" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/49251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2011-09/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://otrs.org/advisory/OSA-2011-03-en/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/45894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/74602" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/49251" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…