Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-2491 (GCVE-0-2010-2491)
Vulnerability from cvelistv5 – Published: 2010-09-24 18:00 – Updated: 2024-08-07 02:32
VLAI?
EPSS
Summary
Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:32:16.774Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2010-12290",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html"
},
{
"name": "[roundup-devel] 20100701 Roundup Issue Tracker 1.4.14 released",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=326395"
},
{
"name": "41585",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/41585"
},
{
"name": "FEDORA-2010-12261",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://issues.roundup-tracker.org/issue2550654"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=610861"
},
{
"name": "[oss-security] 20100702 CVE Request -- Roundup: XSS by processing PageTemplate template for a named page",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/3"
},
{
"name": "40433",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/40433"
},
{
"name": "41326",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/41326"
},
{
"name": "[oss-security] 20100702 Re: CVE Request -- Roundup: XSS by processing PageTemplate template for a named page",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/12"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486\u0026r2=4485\u0026pathrev=4486"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision\u0026revision=4486"
},
{
"name": "FEDORA-2010-12269",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-09-24T18:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "FEDORA-2010-12290",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html"
},
{
"name": "[roundup-devel] 20100701 Roundup Issue Tracker 1.4.14 released",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=326395"
},
{
"name": "41585",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/41585"
},
{
"name": "FEDORA-2010-12261",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://issues.roundup-tracker.org/issue2550654"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=610861"
},
{
"name": "[oss-security] 20100702 CVE Request -- Roundup: XSS by processing PageTemplate template for a named page",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/3"
},
{
"name": "40433",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/40433"
},
{
"name": "41326",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/41326"
},
{
"name": "[oss-security] 20100702 Re: CVE Request -- Roundup: XSS by processing PageTemplate template for a named page",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/12"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486\u0026r2=4485\u0026pathrev=4486"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision\u0026revision=4486"
},
{
"name": "FEDORA-2010-12269",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-2491",
"datePublished": "2010-09-24T18:00:00.000Z",
"dateReserved": "2010-06-28T00:00:00.000Z",
"dateUpdated": "2024-08-07T02:32:16.774Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GHSA-FRGF-RV99-862X
Vulnerability from github – Published: 2022-05-17 05:28 – Updated: 2024-10-26 22:46
VLAI?
Summary
Roundup Cross-site Scripting (XSS) vulnerability
Details
Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program.
Severity ?
6.1 (Medium)
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "roundup"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.14"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2010-2491"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2024-05-01T11:16:54Z",
"nvd_published_at": "2010-09-24T19:00:00Z",
"severity": "MODERATE"
},
"details": "Cross-site scripting (XSS) vulnerability in `cgi/client.py` in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program.",
"id": "GHSA-frgf-rv99-862x",
"modified": "2024-10-26T22:46:47Z",
"published": "2022-05-17T05:28:58Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2491"
},
{
"type": "WEB",
"url": "https://github.com/roundup-tracker/roundup/commit/dcef024bae8f63d290454250767a377eb0e1647b"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=610861"
},
{
"type": "WEB",
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/roundup/PYSEC-2010-31.yaml"
},
{
"type": "PACKAGE",
"url": "https://github.com/roundup-tracker/roundup"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20111225190151/http://secunia.com/advisories/41585"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20140725071254/http://secunia.com/advisories/40433"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20200228183400/http://www.securityfocus.com/bid/41326"
},
{
"type": "WEB",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=326395"
},
{
"type": "WEB",
"url": "http://issues.roundup-tracker.org/issue2550654"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html"
},
{
"type": "WEB",
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486\u0026r2=4485\u0026pathrev=4486"
},
{
"type": "WEB",
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision\u0026revision=4486"
},
{
"type": "WEB",
"url": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/12"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/3"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Roundup Cross-site Scripting (XSS) vulnerability"
}
PYSEC-2010-31
Vulnerability from pysec - Published: 2010-09-24 19:00 - Updated: 2021-08-27 03:22
VLAI?
Details
Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program.
Impacted products
| Name | purl | roundup | pkg:pypi/roundup |
|---|
Aliases
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "roundup",
"purl": "pkg:pypi/roundup"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.14"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"0.5.9",
"0.6.11",
"0.6.8",
"0.6.9",
"0.7.0",
"0.7.0b3",
"0.7.1",
"0.7.11",
"0.7.12",
"0.7.2",
"0.7.3",
"0.7.4",
"0.7.5",
"0.7.7",
"0.7.8",
"0.7.9",
"0.8.0",
"0.8.0b1",
"0.8.1",
"0.8.2",
"0.8.3",
"0.8.4",
"0.8.5",
"0.8.6",
"0.9.0b1",
"1.0",
"1.0.1",
"1.1.0",
"1.1.1",
"1.1.2",
"1.2.0",
"1.2.1",
"1.3.0",
"1.3.1",
"1.3.2",
"1.3.3",
"1.4.0",
"1.4.1",
"1.4.10",
"1.4.11",
"1.4.12",
"1.4.13",
"1.4.2",
"1.4.3",
"1.4.4",
"1.4.5.1",
"1.4.6",
"1.4.7",
"1.4.8",
"1.4.9"
]
}
],
"aliases": [
"CVE-2010-2491"
],
"details": "Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program.",
"id": "PYSEC-2010-31",
"modified": "2021-08-27T03:22:19.672970Z",
"published": "2010-09-24T19:00:00Z",
"references": [
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/41326"
},
{
"type": "WEB",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=326395"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=610861"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html"
},
{
"type": "WEB",
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision\u0026revision=4486"
},
{
"type": "WEB",
"url": "http://issues.roundup-tracker.org/issue2550654"
},
{
"type": "WEB",
"url": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com"
},
{
"type": "ADVISORY",
"url": "http://secunia.com/advisories/41585"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/12"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/3"
},
{
"type": "WEB",
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486\u0026r2=4485\u0026pathrev=4486"
},
{
"type": "ADVISORY",
"url": "http://secunia.com/advisories/40433"
}
]
}
GSD-2010-2491
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2010-2491",
"description": "Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program.",
"id": "GSD-2010-2491"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2010-2491"
],
"details": "Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program.",
"id": "GSD-2010-2491",
"modified": "2023-12-13T01:21:31.629987Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2491",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=326395",
"refsource": "MISC",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=326395"
},
{
"name": "http://issues.roundup-tracker.org/issue2550654",
"refsource": "MISC",
"url": "http://issues.roundup-tracker.org/issue2550654"
},
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html"
},
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html"
},
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html"
},
{
"name": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486\u0026r2=4485\u0026pathrev=4486",
"refsource": "MISC",
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486\u0026r2=4485\u0026pathrev=4486"
},
{
"name": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision\u0026revision=4486",
"refsource": "MISC",
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision\u0026revision=4486"
},
{
"name": "http://secunia.com/advisories/40433",
"refsource": "MISC",
"url": "http://secunia.com/advisories/40433"
},
{
"name": "http://secunia.com/advisories/41585",
"refsource": "MISC",
"url": "http://secunia.com/advisories/41585"
},
{
"name": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com",
"refsource": "MISC",
"url": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com"
},
{
"name": "http://www.openwall.com/lists/oss-security/2010/07/02/12",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/12"
},
{
"name": "http://www.openwall.com/lists/oss-security/2010/07/02/3",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/3"
},
{
"name": "http://www.securityfocus.com/bid/41326",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/41326"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=610861",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=610861"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.0:b2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.8.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.8.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.8.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.8.0:b2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.4.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.4.13",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.8.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.9.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.4.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.5.8:stable:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.5.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.0:b3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.4.0:b2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.5.0:pr1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.4.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.7.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.4.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.4.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.4.2:pr1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.5.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:0.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:roundup-tracker:roundup:1.4.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2491"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2010-12290",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html"
},
{
"name": "41326",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/41326"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=326395",
"refsource": "CONFIRM",
"tags": [],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=326395"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=610861",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=610861"
},
{
"name": "FEDORA-2010-12269",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html"
},
{
"name": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision\u0026revision=4486",
"refsource": "CONFIRM",
"tags": [],
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision\u0026revision=4486"
},
{
"name": "http://issues.roundup-tracker.org/issue2550654",
"refsource": "CONFIRM",
"tags": [],
"url": "http://issues.roundup-tracker.org/issue2550654"
},
{
"name": "[roundup-devel] 20100701 Roundup Issue Tracker 1.4.14 released",
"refsource": "MLIST",
"tags": [],
"url": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com"
},
{
"name": "41585",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/41585"
},
{
"name": "[oss-security] 20100702 Re: CVE Request -- Roundup: XSS by processing PageTemplate template for a named page",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/12"
},
{
"name": "FEDORA-2010-12261",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html"
},
{
"name": "[oss-security] 20100702 CVE Request -- Roundup: XSS by processing PageTemplate template for a named page",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/3"
},
{
"name": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486\u0026r2=4485\u0026pathrev=4486",
"refsource": "CONFIRM",
"tags": [],
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486\u0026r2=4485\u0026pathrev=4486"
},
{
"name": "40433",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/40433"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2012-05-31T04:00Z",
"publishedDate": "2010-09-24T19:00Z"
}
}
}
FKIE_CVE-2010-2491
Vulnerability from fkie_nvd - Published: 2010-09-24 19:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://bugs.gentoo.org/show_bug.cgi?id=326395 | ||
| secalert@redhat.com | http://issues.roundup-tracker.org/issue2550654 | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html | ||
| secalert@redhat.com | http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486&r2=4485&pathrev=4486 | ||
| secalert@redhat.com | http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision&revision=4486 | ||
| secalert@redhat.com | http://secunia.com/advisories/40433 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/41585 | Vendor Advisory | |
| secalert@redhat.com | http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2010/07/02/12 | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2010/07/02/3 | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/41326 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=610861 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://bugs.gentoo.org/show_bug.cgi?id=326395 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://issues.roundup-tracker.org/issue2550654 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486&r2=4485&pathrev=4486 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision&revision=4486 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40433 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/41585 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2010/07/02/12 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2010/07/02/3 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/41326 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=610861 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| roundup-tracker | roundup | * | |
| roundup-tracker | roundup | 0.1.0 | |
| roundup-tracker | roundup | 0.1.1 | |
| roundup-tracker | roundup | 0.1.2 | |
| roundup-tracker | roundup | 0.1.3 | |
| roundup-tracker | roundup | 0.2.0 | |
| roundup-tracker | roundup | 0.2.1 | |
| roundup-tracker | roundup | 0.2.2 | |
| roundup-tracker | roundup | 0.2.3 | |
| roundup-tracker | roundup | 0.2.4 | |
| roundup-tracker | roundup | 0.2.5 | |
| roundup-tracker | roundup | 0.2.6 | |
| roundup-tracker | roundup | 0.2.7 | |
| roundup-tracker | roundup | 0.2.8 | |
| roundup-tracker | roundup | 0.3.0 | |
| roundup-tracker | roundup | 0.3.0 | |
| roundup-tracker | roundup | 0.3.0 | |
| roundup-tracker | roundup | 0.3.0 | |
| roundup-tracker | roundup | 0.4.0 | |
| roundup-tracker | roundup | 0.4.0 | |
| roundup-tracker | roundup | 0.4.0 | |
| roundup-tracker | roundup | 0.4.1 | |
| roundup-tracker | roundup | 0.4.2 | |
| roundup-tracker | roundup | 0.4.2 | |
| roundup-tracker | roundup | 0.5 | |
| roundup-tracker | roundup | 0.5.0 | |
| roundup-tracker | roundup | 0.5.0 | |
| roundup-tracker | roundup | 0.5.0 | |
| roundup-tracker | roundup | 0.5.0 | |
| roundup-tracker | roundup | 0.5.1 | |
| roundup-tracker | roundup | 0.5.2 | |
| roundup-tracker | roundup | 0.5.3 | |
| roundup-tracker | roundup | 0.5.4 | |
| roundup-tracker | roundup | 0.5.5 | |
| roundup-tracker | roundup | 0.5.6 | |
| roundup-tracker | roundup | 0.5.7 | |
| roundup-tracker | roundup | 0.5.8 | |
| roundup-tracker | roundup | 0.5.9 | |
| roundup-tracker | roundup | 0.6.0 | |
| roundup-tracker | roundup | 0.6.0 | |
| roundup-tracker | roundup | 0.6.0 | |
| roundup-tracker | roundup | 0.6.0 | |
| roundup-tracker | roundup | 0.6.0 | |
| roundup-tracker | roundup | 0.6.1 | |
| roundup-tracker | roundup | 0.6.2 | |
| roundup-tracker | roundup | 0.6.3 | |
| roundup-tracker | roundup | 0.6.4 | |
| roundup-tracker | roundup | 0.6.5 | |
| roundup-tracker | roundup | 0.6.6 | |
| roundup-tracker | roundup | 0.6.7 | |
| roundup-tracker | roundup | 0.6.8 | |
| roundup-tracker | roundup | 0.6.9 | |
| roundup-tracker | roundup | 0.6.10 | |
| roundup-tracker | roundup | 0.6.11 | |
| roundup-tracker | roundup | 0.7.0 | |
| roundup-tracker | roundup | 0.7.0 | |
| roundup-tracker | roundup | 0.7.0 | |
| roundup-tracker | roundup | 0.7.0 | |
| roundup-tracker | roundup | 0.7.1 | |
| roundup-tracker | roundup | 0.7.2 | |
| roundup-tracker | roundup | 0.7.3 | |
| roundup-tracker | roundup | 0.7.4 | |
| roundup-tracker | roundup | 0.7.5 | |
| roundup-tracker | roundup | 0.7.6 | |
| roundup-tracker | roundup | 0.7.7 | |
| roundup-tracker | roundup | 0.7.8 | |
| roundup-tracker | roundup | 0.7.9 | |
| roundup-tracker | roundup | 0.7.10 | |
| roundup-tracker | roundup | 0.7.11 | |
| roundup-tracker | roundup | 0.7.12 | |
| roundup-tracker | roundup | 0.8.0 | |
| roundup-tracker | roundup | 0.8.0 | |
| roundup-tracker | roundup | 0.8.0 | |
| roundup-tracker | roundup | 0.8.1 | |
| roundup-tracker | roundup | 0.8.2 | |
| roundup-tracker | roundup | 0.8.3 | |
| roundup-tracker | roundup | 0.8.4 | |
| roundup-tracker | roundup | 0.8.5 | |
| roundup-tracker | roundup | 0.8.6 | |
| roundup-tracker | roundup | 0.9.0 | |
| roundup-tracker | roundup | 1.0 | |
| roundup-tracker | roundup | 1.0.1 | |
| roundup-tracker | roundup | 1.1.0 | |
| roundup-tracker | roundup | 1.1.1 | |
| roundup-tracker | roundup | 1.1.2 | |
| roundup-tracker | roundup | 1.2.0 | |
| roundup-tracker | roundup | 1.2.1 | |
| roundup-tracker | roundup | 1.3.0 | |
| roundup-tracker | roundup | 1.3.1 | |
| roundup-tracker | roundup | 1.3.2 | |
| roundup-tracker | roundup | 1.3.3 | |
| roundup-tracker | roundup | 1.4.0 | |
| roundup-tracker | roundup | 1.4.1 | |
| roundup-tracker | roundup | 1.4.2 | |
| roundup-tracker | roundup | 1.4.3 | |
| roundup-tracker | roundup | 1.4.4 | |
| roundup-tracker | roundup | 1.4.5 | |
| roundup-tracker | roundup | 1.4.6 | |
| roundup-tracker | roundup | 1.4.7 | |
| roundup-tracker | roundup | 1.4.8 | |
| roundup-tracker | roundup | 1.4.9 | |
| roundup-tracker | roundup | 1.4.10 | |
| roundup-tracker | roundup | 1.4.11 | |
| roundup-tracker | roundup | 1.4.12 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1873A916-0008-404F-AE8D-77BDB5D3E667",
"versionEndIncluding": "1.4.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "19ECB7A0-10A6-4745-A14A-1FDCBA54FA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9968A3F6-095B-40E8-B5B3-FF0B9DDF4D66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53AB2FBF-3D72-4548-B7EF-A9966DDADE99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0079C51C-5341-4ABD-AEC3-ED95D6B3849E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D942F581-EEE1-4475-91BC-A381F647DB4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "85EA6E14-83A2-4EB5-B288-1BAAAE7BB15E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3B79CB12-0F99-4337-8FFE-300E1F2635A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7924E0-09DE-4231-8543-93F132C525D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B5181473-7735-4C4D-84EB-45123A4CB2EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "611D6B74-E98A-4060-A4E8-0066B23097C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DDDDAB17-2E78-4F3A-8129-5F6B0AD6824C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7BC05048-471F-43B8-84F1-B3A4AD0BEB1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D5EA1112-FD27-4560-99B9-F95CB4875B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3B1C7A4E-B709-45B9-820B-9DA47D09A768",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre1:*:*:*:*:*:*",
"matchCriteriaId": "12248494-B69A-493A-8BAA-AED8B6D90967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre2:*:*:*:*:*:*",
"matchCriteriaId": "83D18991-4357-4EDA-B58A-C2B2D55AF65C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre3:*:*:*:*:*:*",
"matchCriteriaId": "3EA23543-A008-4A35-A2FD-A5C92419B5D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85911897-FF14-4287-A70C-2BE1533D7DD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.4.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "C5AF4647-28B7-4A1F-8CE0-1AECF5E9DA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.4.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "7491CD5B-BE8B-43D9-9A9C-A9D9091FFF98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C170F3BF-A954-4259-AFEA-8FBBA9A03E8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "368312AF-2FC0-4528-A735-FE8E6412637D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.4.2:pr1:*:*:*:*:*:*",
"matchCriteriaId": "15A83A5C-A463-4A90-9C2B-CD4BF64D9F93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BFA22ED9-74AB-4B1A-AE32-002CBC70DD33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA7035B-ACAD-43CC-8B0A-5D5C71ED4D00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5FF02B8B-EE0E-490C-B611-9E9073B08A16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "FB0B1077-5E96-49D8-8C42-E1B269D977D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.0:pr1:*:*:*:*:*:*",
"matchCriteriaId": "62D6C85E-EDA1-4F97-86F7-A55D0209E9E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "046CAABB-4A40-4734-9506-FE9E5D74ED6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D7C743E-B264-4FEB-AE0D-6B63C6D25CD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18AC89CD-2092-4694-8DA3-268466CB1728",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C8EB5412-927B-49F4-B1F1-0890AB674F1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B52588E4-C6C4-45DE-B8C2-4948AEAA2E75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7C747D8A-1FD7-4E80-949F-49833D8A871B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "74CEEC73-4AF9-4E5A-A526-101E23A7ED2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.8:stable:*:*:*:*:*:*",
"matchCriteriaId": "6890C793-5346-4274-91F6-D3A1F4D4454B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "10F15818-1EC9-4E72-8E10-BF7CBEE6DECC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2136129D-9795-4281-A07E-297BE50A7A93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "31430BEC-1190-46F9-82B8-6EBE6CBE1BEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "E0855645-97A3-4CA1-9A7C-3050151302E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "86F1057A-0273-4B77-8DD9-32D54676F991",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "ACC3C30E-4796-49CE-AFDF-DC7B29737FAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "068DEB7C-DAC2-45D6-A0B6-DC54EF52DF14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "960311B7-4C1B-4D7F-B8D1-A99977C389D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "953F1AAF-CFF8-462C-99E4-7A4D8404BCEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "280DC837-EB0D-42EA-8236-FFD87B0987AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B57648C-D3D8-4ADE-8500-9E7CC170DF63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E74C7F38-1DF5-4817-A6F7-F24E015346C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A7305D65-2C60-4AC0-86E8-10A115EC008C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8829C3BE-C384-4CB5-9128-12338E1E68F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "134F2504-202E-456E-973F-CDF26EC119A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "67CB2FD7-7E9E-4395-98B9-7A97B2140A4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "932E8C5F-23DC-4A3D-8683-095E98595A06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "34318627-2740-4FDC-BF08-87CD6AD82F8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "8455602A-65E5-4DAE-9D66-CA9A226E5AAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "5ABA002F-3226-4492-9E4A-F8D2BD0C0791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "3595DB2B-EA69-4A47-B69D-3D526E9E9D89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D864CE13-3E5D-4A43-B45C-50FD73634828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5E6CF969-C90B-47AD-8538-F865C6D96F82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BE2ADB27-CC67-4E07-AB14-D4E7AFBAF41A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C00B6823-DDC4-455B-806E-20DC50C91CBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "25307B01-1BDF-402C-BAB8-3F79E3AD5FE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B20E4D7D-AEB3-431A-8EAD-AA0968F339A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EE10C1E5-78C2-460D-BD73-97026C18D2D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "EAA37A04-8B76-41F5-BB6A-BC510100A59A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E83205C4-D7BE-41C8-B4B2-76B265743D39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "CAA29FD3-B9CE-47B8-9593-BD953C3ECC6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.11:*:*:*:*:*:*:*",
"matchCriteriaId": "88EC7A4B-678F-4A87-9E7F-1F9B95647E6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A7B45F23-702E-436A-BEF5-26AB0B7B3288",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "41C8C39E-F339-48A4-83AB-D89493070418",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "0C1E36E4-C4C9-4AE9-A91E-504B75441D9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "CA49A32F-5932-4E3D-80F4-3F695E6D967E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D98E71AD-3B23-44D8-B7DE-902B616BED76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "36336002-7EDC-47D2-A652-923C5DC99847",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6893FFAD-A2D1-4C8B-983F-68C2899E56E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "81944927-FFCF-4709-B80B-7279CE31A0D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A5B11756-4710-4E9A-9E37-C3FA1C5E5B7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8DEAB81E-DAA8-49CD-AEC7-1492DE605172",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:0.9.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "4AF05890-2633-4863-B545-ED923D9A4A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D00A7FA-8CC2-49DE-B515-7ADA3240549E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "55982C77-F866-4298-BD46-E3DF136C6203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "69A92DF0-153B-4130-A12F-28A921673A94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E6A5DC6-8E85-4545-840A-3D5DF8FB3B2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A85D14A2-5505-43CC-8416-6165C604D363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0BCEF97A-C493-41A8-8A7D-4A187F016AEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "55B7551D-6264-4949-A038-6006F432F261",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12903A2D-44DF-4606-B4DB-0501786A22C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7032E7E5-B353-451C-AA8A-70F055DE68C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A11A4AFF-EE53-477D-9B82-6A65A6765DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F5E2921-8219-4F59-B877-C2BCF9C0AB02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0038D97D-E099-41FD-B467-C2FA8A1A04BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CCFDDF8D-B34E-4A31-A335-E41477436C44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "764F3225-B6F0-497E-B2BD-A6CBA40D06BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9F9BE58-8A1B-4BF3-A2D4-D68051FE67C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB15B4C-911F-4F48-A3F8-12F9A33CB9E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "50EA0CD8-DA56-4969-A7D0-39DD9668F9FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "832F0C0A-5AF2-46A5-B785-2DC698250944",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E536CDAA-0ABB-46FD-BD46-7644EF05ABDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "42084E64-9203-4F73-ADD0-D7FDEBE2AFA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F58AB7D5-0873-4400-84C3-871409DA2F39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7B7907BD-2B4F-45CF-9102-AED8ABE7F999",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C93114B4-7041-46E9-B97B-5D581331FED5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "BA1CF57F-4E06-4146-91FB-65A0702FBB2A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en cgi/client.py de Roundup en versiones anteriores a la v1.4.14 permite a usuarios remotos inyectar codigo de script web o c\u00f3digo HTML de su elecci\u00f3n a trav\u00e9s del argumento \"template\" (plantilla) al programa /issue."
}
],
"id": "CVE-2010-2491",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2010-09-24T19:00:04.730",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=326395"
},
{
"source": "secalert@redhat.com",
"url": "http://issues.roundup-tracker.org/issue2550654"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html"
},
{
"source": "secalert@redhat.com",
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486\u0026r2=4485\u0026pathrev=4486"
},
{
"source": "secalert@redhat.com",
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision\u0026revision=4486"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/40433"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/41585"
},
{
"source": "secalert@redhat.com",
"url": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/12"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/3"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/41326"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=610861"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=326395"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://issues.roundup-tracker.org/issue2550654"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048018.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048061.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048221.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup/roundup/trunk/roundup/cgi/client.py?r1=4486\u0026r2=4485\u0026pathrev=4486"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://roundup.svn.sourceforge.net/viewvc/roundup?view=revision\u0026revision=4486"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/40433"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/41585"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sourceforge.net/mailarchive/message.php?msg_name=AANLkTimIYtyRzTAReGmTSCEqPYBvwkkxrP6YKrdVm_nU%40mail.gmail.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2010/07/02/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/41326"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=610861"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…