Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-2761 (GCVE-0-2010-2761)
Vulnerability from cvelistv5 – Published: 2010-12-06 20:00 – Updated: 2024-08-07 02:46- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:46:47.287Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm"
},
{
"name": "RHSA-2011:1797",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1797.html"
},
{
"name": "SUSE-SR:2011:001",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
},
{
"name": "FEDORA-2011-0653",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html"
},
{
"name": "43068",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43068"
},
{
"name": "[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2010/12/01/2"
},
{
"name": "69588",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/69588"
},
{
"name": "43165",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43165"
},
{
"name": "[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2010/12/01/3"
},
{
"name": "ADV-2011-0212",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=591165"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.bugzilla.org/security/3.2.9/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=600464"
},
{
"name": "FEDORA-2011-0741",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html"
},
{
"name": "SUSE-SR:2011:005",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "ADV-2011-0271",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0271"
},
{
"name": "43033",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43033"
},
{
"name": "ADV-2011-0207",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0207"
},
{
"name": "42877",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/42877"
},
{
"name": "SUSE-SR:2011:002",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1"
},
{
"name": "ADV-2011-0249",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0249"
},
{
"name": "FEDORA-2011-0755",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html"
},
{
"name": "MDVSA-2010:250",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:250"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html"
},
{
"name": "MDVSA-2010:237",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:237"
},
{
"name": "69589",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/69589"
},
{
"name": "ADV-2011-0076",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0076"
},
{
"name": "[oss-security] 20101201 CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2010/12/01/1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes"
},
{
"name": "FEDORA-2011-0631",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "43147",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43147"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-11-09T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-06T18:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm"
},
{
"name": "RHSA-2011:1797",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1797.html"
},
{
"name": "SUSE-SR:2011:001",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
},
{
"name": "FEDORA-2011-0653",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html"
},
{
"name": "43068",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43068"
},
{
"name": "[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2010/12/01/2"
},
{
"name": "69588",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/69588"
},
{
"name": "43165",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43165"
},
{
"name": "[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2010/12/01/3"
},
{
"name": "ADV-2011-0212",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=591165"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.bugzilla.org/security/3.2.9/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=600464"
},
{
"name": "FEDORA-2011-0741",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html"
},
{
"name": "SUSE-SR:2011:005",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "ADV-2011-0271",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0271"
},
{
"name": "43033",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43033"
},
{
"name": "ADV-2011-0207",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0207"
},
{
"name": "42877",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/42877"
},
{
"name": "SUSE-SR:2011:002",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1"
},
{
"name": "ADV-2011-0249",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0249"
},
{
"name": "FEDORA-2011-0755",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html"
},
{
"name": "MDVSA-2010:250",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:250"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html"
},
{
"name": "MDVSA-2010:237",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:237"
},
{
"name": "69589",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/69589"
},
{
"name": "ADV-2011-0076",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0076"
},
{
"name": "[oss-security] 20101201 CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2010/12/01/1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes"
},
{
"name": "FEDORA-2011-0631",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "43147",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43147"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-2761",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm",
"refsource": "CONFIRM",
"url": "http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm"
},
{
"name": "RHSA-2011:1797",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1797.html"
},
{
"name": "SUSE-SR:2011:001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
},
{
"name": "FEDORA-2011-0653",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html"
},
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name": "[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/01/2"
},
{
"name": "69588",
"refsource": "OSVDB",
"url": "http://osvdb.org/69588"
},
{
"name": "43165",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43165"
},
{
"name": "[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/01/3"
},
{
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=591165",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=591165"
},
{
"name": "https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380",
"refsource": "CONFIRM",
"url": "https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380"
},
{
"name": "http://www.bugzilla.org/security/3.2.9/",
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security/3.2.9/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=600464",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=600464"
},
{
"name": "FEDORA-2011-0741",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html"
},
{
"name": "SUSE-SR:2011:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "ADV-2011-0271",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0271"
},
{
"name": "43033",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43033"
},
{
"name": "ADV-2011-0207",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0207"
},
{
"name": "42877",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42877"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1",
"refsource": "CONFIRM",
"url": "http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1"
},
{
"name": "ADV-2011-0249",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0249"
},
{
"name": "FEDORA-2011-0755",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html"
},
{
"name": "MDVSA-2010:250",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:250"
},
{
"name": "http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html",
"refsource": "CONFIRM",
"url": "http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html"
},
{
"name": "MDVSA-2010:237",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:237"
},
{
"name": "69589",
"refsource": "OSVDB",
"url": "http://osvdb.org/69589"
},
{
"name": "ADV-2011-0076",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0076"
},
{
"name": "[oss-security] 20101201 CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/01/1"
},
{
"name": "http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes",
"refsource": "CONFIRM",
"url": "http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes"
},
{
"name": "FEDORA-2011-0631",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "43147",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43147"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-2761",
"datePublished": "2010-12-06T20:00:00.000Z",
"dateReserved": "2010-07-14T00:00:00.000Z",
"dateUpdated": "2024-08-07T02:46:47.287Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTA-2013-AVI-593
Vulnerability from certfr_avis - Published: 2013-10-18 - Updated: 2013-10-18
De multiples vulnérabilités ont été corrigées dans Oracle Solaris. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Solaris 11",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 9",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-5526",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5526"
},
{
"name": "CVE-2010-4411",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4411"
},
{
"name": "CVE-2011-2728",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2728"
},
{
"name": "CVE-2010-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2761"
},
{
"name": "CVE-2012-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5195"
},
{
"name": "CVE-2012-6329",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6329"
},
{
"name": "CVE-2011-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3597"
}
],
"initial_release_date": "2013-10-18T00:00:00",
"last_revision_date": "2013-10-18T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-593",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-10-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 17 octobre 2013",
"url": "http://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html"
}
]
}
CERTFR-2015-AVI-431
Vulnerability from certfr_avis - Published: 2015-10-15 - Updated: 2015-10-15
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QFabric 3100 Director versions 12.x",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ScreenOS",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "CTPView 7.0R3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper Junos OS",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2905"
},
{
"name": "CVE-2011-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2483"
},
{
"name": "CVE-2013-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1667"
},
{
"name": "CVE-2012-3417",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3417"
},
{
"name": "CVE-2014-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0063"
},
{
"name": "CVE-2015-5600",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5600"
},
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2014-8867",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8867"
},
{
"name": "CVE-2015-1793",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1793"
},
{
"name": "CVE-2015-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1791"
},
{
"name": "CVE-2009-3490",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3490"
},
{
"name": "CVE-2012-0866",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0866"
},
{
"name": "CVE-2010-3433",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3433"
},
{
"name": "CVE-2012-5526",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5526"
},
{
"name": "CVE-2010-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1447"
},
{
"name": "CVE-2014-0061",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0061"
},
{
"name": "CVE-2009-0115",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0115"
},
{
"name": "CVE-2007-6067",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6067"
},
{
"name": "CVE-2010-0826",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0826"
},
{
"name": "CVE-2014-8159",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8159"
},
{
"name": "CVE-2010-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0211"
},
{
"name": "CVE-2013-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4242"
},
{
"name": "CVE-2015-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1158"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2010-4352",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4352"
},
{
"name": "CVE-2015-7749",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7749"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2010-1168",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1168"
},
{
"name": "CVE-2009-1189",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1189"
},
{
"name": "CVE-2014-6450",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6450"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2008-2937",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2937"
},
{
"name": "CVE-2012-2697",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2697"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2011-1081",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1081"
},
{
"name": "CVE-2009-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1632"
},
{
"name": "CVE-2012-3488",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3488"
},
{
"name": "CVE-2015-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5361"
},
{
"name": "CVE-2013-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6435"
},
{
"name": "CVE-2010-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2761"
},
{
"name": "CVE-2012-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5195"
},
{
"name": "CVE-2015-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1788"
},
{
"name": "CVE-2014-6449",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6449"
},
{
"name": "CVE-2015-1792",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1792"
},
{
"name": "CVE-2014-6451",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6451"
},
{
"name": "CVE-2012-6329",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6329"
},
{
"name": "CVE-2014-4345",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4345"
},
{
"name": "CVE-2008-5302",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5302"
},
{
"name": "CVE-2013-6629",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6629"
},
{
"name": "CVE-2014-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2285"
},
{
"name": "CVE-2013-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4449"
},
{
"name": "CVE-2012-0868",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0868"
},
{
"name": "CVE-2007-4476",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4476"
},
{
"name": "CVE-2010-4410",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4410"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2015-7752",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7752"
},
{
"name": "CVE-2010-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0407"
},
{
"name": "CVE-2014-0064",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0064"
},
{
"name": "CVE-2014-0065",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0065"
},
{
"name": "CVE-2007-4772",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4772"
},
{
"name": "CVE-2013-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0292"
},
{
"name": "CVE-2012-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6151"
},
{
"name": "CVE-2008-5303",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5303"
},
{
"name": "CVE-2015-1159",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1159"
},
{
"name": "CVE-2011-2200",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2200"
},
{
"name": "CVE-2015-7748",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7748"
},
{
"name": "CVE-2015-7750",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7750"
},
{
"name": "CVE-2015-7751",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7751"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2008-3834",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3834"
},
{
"name": "CVE-2010-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0624"
},
{
"name": "CVE-2014-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0062"
},
{
"name": "CVE-2011-1025",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1025"
},
{
"name": "CVE-2014-6448",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6448"
},
{
"name": "CVE-2011-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3597"
},
{
"name": "CVE-2010-0212",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0212"
},
{
"name": "CVE-2009-1185",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1185"
},
{
"name": "CVE-2009-4901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4901"
},
{
"name": "CVE-2010-1172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1172"
},
{
"name": "CVE-2010-4530",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4530"
},
{
"name": "CVE-2011-1024",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1024"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2014-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0060"
},
{
"name": "CVE-1999-0524",
"url": "https://www.cve.org/CVERecord?id=CVE-1999-0524"
},
{
"name": "CVE-2010-4015",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4015"
},
{
"name": "CVE-2011-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0002"
},
{
"name": "CVE-2009-1574",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1574"
},
{
"name": "CVE-2009-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3736"
},
{
"name": "CVE-2015-1790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1790"
},
{
"name": "CVE-2012-2143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2143"
},
{
"name": "CVE-2014-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0066"
},
{
"name": "CVE-2010-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0001"
}
],
"initial_release_date": "2015-10-15T00:00:00",
"last_revision_date": "2015-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-431",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10694 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10700 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10700\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10703 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10703\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10708 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10708\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10705 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10706 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10706\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10695 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10695\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10699 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10699\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10697 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10697\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10707 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10707\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10702 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10702\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10704 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10704\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10696 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10696\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10701 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10701\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTA-2012-AVI-479
Vulnerability from certfr_avis - Published: 2012-09-03 - Updated: 2012-09-03
De multiples vulnérabilités ont été corrigées dans les produits VMware. Elles concernent les éléments d'éditeurs tiers implémentés dans les solutions. Les éléments suivants ont étés mis à jour :
- Java Runtime Environment (JRE) ;
- OpenSSL ;
- le noyau ;
- Perl ;
- libxml2 ;
- glibc ;
- GnuTLS ;
- popt et rpm ;
- Apache struts.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware ESX version 4.1 ; | ||
| VMware | N/A | VMware vCO version 4.0. | ||
| VMware | N/A | VMware vCenter version 5.0 ; | ||
| VMware | N/A | VMware vCOps version 1.0.x ; | ||
| VMware | ESXi | VMware ESXi version 3.5 ; | ||
| VMware | N/A | VMware Update Manager version 5.0 ; | ||
| VMware | N/A | VMware Update Manager version 4.0 ; | ||
| VMware | N/A | VMware vCO version 4.1 ; | ||
| VMware | ESXi | VMware ESXi version 4.1 ; | ||
| VMware | N/A | VMware vCenter version 4.0 ; | ||
| VMware | N/A | VMware vCenter version 4.1 ; | ||
| VMware | N/A | VMware vCOps version 5.0.2 ; | ||
| VMware | ESXi | VMware ESXi version 4.0 ; | ||
| VMware | N/A | VMware VirtualCenter version 2.5 ; | ||
| VMware | N/A | VMware Update Manager version 4.1 ; | ||
| VMware | ESXi | VMware ESXi version 5.0 ; | ||
| VMware | N/A | VMware ESX version 4.0 ; | ||
| VMware | N/A | VMware ESX version 3.5 ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware ESX version 4.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCO version 4.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter version 5.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCOps version 1.0.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi version 3.5 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Update Manager version 5.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Update Manager version 4.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCO version 4.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi version 4.1 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter version 4.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter version 4.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCOps version 5.0.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi version 4.0 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware VirtualCenter version 2.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Update Manager version 4.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi version 5.0 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX version 4.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX version 3.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1833"
},
{
"name": "CVE-2012-0050",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0050"
},
{
"name": "CVE-2011-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4132"
},
{
"name": "CVE-2011-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4609"
},
{
"name": "CVE-2012-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0207"
},
{
"name": "CVE-2011-5057",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5057"
},
{
"name": "CVE-2010-4252",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4252"
},
{
"name": "CVE-2011-4619",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4619"
},
{
"name": "CVE-2012-2110",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2110"
},
{
"name": "CVE-2011-4576",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4576"
},
{
"name": "CVE-2011-2496",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2496"
},
{
"name": "CVE-2009-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5064"
},
{
"name": "CVE-2011-4577",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4577"
},
{
"name": "CVE-2009-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5029"
},
{
"name": "CVE-2012-1569",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1569"
},
{
"name": "CVE-2011-4324",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4324"
},
{
"name": "CVE-2011-4110",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4110"
},
{
"name": "CVE-2011-4108",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4108"
},
{
"name": "CVE-2012-1583",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1583"
},
{
"name": "CVE-2010-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2761"
},
{
"name": "CVE-2012-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0060"
},
{
"name": "CVE-2012-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0391"
},
{
"name": "CVE-2011-4325",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4325"
},
{
"name": "CVE-2010-0830",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0830"
},
{
"name": "CVE-2012-0061",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0061"
},
{
"name": "CVE-2010-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4180"
},
{
"name": "CVE-2012-0864",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0864"
},
{
"name": "CVE-2011-3209",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3209"
},
{
"name": "CVE-2010-4410",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4410"
},
{
"name": "CVE-2012-0392",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0392"
},
{
"name": "CVE-2012-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0394"
},
{
"name": "CVE-2012-0815",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0815"
},
{
"name": "CVE-2011-3188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3188"
},
{
"name": "CVE-2011-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1020"
},
{
"name": "CVE-2011-4109",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4109"
},
{
"name": "CVE-2012-1573",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1573"
},
{
"name": "CVE-2011-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4128"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-2484",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2484"
},
{
"name": "CVE-2012-0393",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0393"
},
{
"name": "CVE-2011-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3597"
},
{
"name": "CVE-2011-3363",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3363"
},
{
"name": "CVE-2011-2699",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2699"
},
{
"name": "CVE-2011-0014",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0014"
},
{
"name": "CVE-2011-1089",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1089"
}
],
"initial_release_date": "2012-09-03T00:00:00",
"last_revision_date": "2012-09-03T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-479",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-09-03T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eVMware\u003c/span\u003e. Elles concernent les \u00e9l\u00e9ments d\u0027\u00e9diteurs\ntiers impl\u00e9ment\u00e9s dans les solutions. Les \u00e9l\u00e9ments suivants ont \u00e9t\u00e9s mis\n\u00e0 jour :\n\n- Java Runtime Environment (JRE) ;\n- OpenSSL ;\n- le noyau ;\n- Perl ;\n- libxml2 ;\n- glibc ;\n- GnuTLS ;\n- popt et rpm ;\n- Apache struts.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2012-0013 du 30 ao\u00fbt 2012",
"url": "http://www.vmware.com/security/advisories/VMSA-2012-0013.html"
}
]
}
CERTFR-2016-AVI-128
Vulnerability from certfr_avis - Published: 2016-04-14 - Updated: 2016-04-14
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3X48-D30 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X44-D60 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1F2 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1R6 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.2R7 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.2R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1X49-D10 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.3R9 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D30 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X47-D35 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R2 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.2R2 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X47-D30 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1X49-D20 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.2X51-D39 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R1 | ||
| Juniper Networks | N/A | CTPOS versions antérieures à 7.2R1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.3R7 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1X49-D30 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R11 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.2X51-D40 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.2R4 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 15.2R1 | ||
| Juniper Networks | N/A | ScreenOS versions antérieures à 6.3.0r22 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1F5 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.2R4-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R9 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3X48-D20 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R3 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.2R6 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1R7 | ||
| Juniper Networks | N/A | CTPOS versions antérieures à 7.1R2 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X46-D45 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1X49-D40 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.2R3 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 16.1R1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X46-D40 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X47-D25 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.3R8 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.2R5 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.2X52-D30 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X44-D55 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3X50-D50 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1R4 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.3R6 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.2R8 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3X48-D25 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1X53-D20 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1X49-D15 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.2R9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3X48-D30",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X44-D60",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1F2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1R6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.2R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.2R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1X49-D10",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.3R9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D30",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X47-D35",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.2R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X47-D30",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1X49-D20",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.2X51-D39",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CTPOS versions ant\u00e9rieures \u00e0 7.2R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.3R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1X49-D30",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R11",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.2X51-D40",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.2R4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 15.2R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "ScreenOS versions ant\u00e9rieures \u00e0 6.3.0r22",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1F5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.2R4-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3X48-D20",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.2R6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CTPOS versions ant\u00e9rieures \u00e0 7.1R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D45",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1X49-D40",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 16.1R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D40",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X47-D25",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.3R8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.2R5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.2X52-D30",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X44-D55",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3X50-D50",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1R4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.3R6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.2R8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3X48-D25",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1X53-D20",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1X49-D15",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.2R9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-1270",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1270"
},
{
"name": "CVE-2015-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3153"
},
{
"name": "CVE-2013-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1667"
},
{
"name": "CVE-2016-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1269"
},
{
"name": "CVE-2015-3183",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3183"
},
{
"name": "CVE-2015-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1791"
},
{
"name": "CVE-2012-5526",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5526"
},
{
"name": "CVE-2015-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3195"
},
{
"name": "CVE-2016-0777",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0777"
},
{
"name": "CVE-2015-2613",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2613"
},
{
"name": "CVE-2015-4749",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4749"
},
{
"name": "CVE-2016-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1268"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2015-3148",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3148"
},
{
"name": "CVE-2014-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3613"
},
{
"name": "CVE-2008-2827",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2827"
},
{
"name": "CVE-2016-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1273"
},
{
"name": "CVE-2010-1168",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1168"
},
{
"name": "CVE-2014-8151",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8151"
},
{
"name": "CVE-2015-4000",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4000"
},
{
"name": "CVE-2016-1261",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1261"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2014-8150",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8150"
},
{
"name": "CVE-2005-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0448"
},
{
"name": "CVE-2014-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3707"
},
{
"name": "CVE-2015-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3143"
},
{
"name": "CVE-2010-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2761"
},
{
"name": "CVE-2012-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5195"
},
{
"name": "CVE-2010-3172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3172"
},
{
"name": "CVE-2012-6329",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6329"
},
{
"name": "CVE-2004-0452",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-0452"
},
{
"name": "CVE-2008-5302",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5302"
},
{
"name": "CVE-2013-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4449"
},
{
"name": "CVE-2010-4410",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4410"
},
{
"name": "CVE-2016-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1271"
},
{
"name": "CVE-2015-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3145"
},
{
"name": "CVE-2015-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3144"
},
{
"name": "CVE-2015-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2625"
},
{
"name": "CVE-2008-5303",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5303"
},
{
"name": "CVE-2014-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3620"
},
{
"name": "CVE-2011-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3597"
},
{
"name": "CVE-2015-2659",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2659"
},
{
"name": "CVE-2010-0212",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0212"
},
{
"name": "CVE-2016-1274",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1274"
},
{
"name": "CVE-2011-1024",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1024"
},
{
"name": "CVE-2016-1267",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1267"
},
{
"name": "CVE-2015-2601",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2601"
},
{
"name": "CVE-2016-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1264"
},
{
"name": "CVE-2015-4748",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4748"
},
{
"name": "CVE-2014-0015",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0015"
},
{
"name": "CVE-2015-1790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1790"
},
{
"name": "CVE-2016-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0778"
}
],
"initial_release_date": "2016-04-14T00:00:00",
"last_revision_date": "2016-04-14T00:00:00",
"links": [],
"reference": "CERTFR-2016-AVI-128",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-04-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Juniper\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10732 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10732\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10733 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10733\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10747 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10747\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10739 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10739\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10734 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10743 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10725 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10725\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10746 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10746\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10736 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10736\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10730 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10730\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10737 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10737\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10735 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10723 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10723\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10727 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10727\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTA-2011-AVI-031
Vulnerability from certfr_avis - Published: 2011-01-25 - Updated: 2011-01-25
Plusieurs vulnérabilités ont été corrigées dans Bugzilla. L'une d'entre elles permet à un utilisateur de récupérer les privilèges d'un autre compte.
Description
Plusieurs vulnérabilités ont été corrigées dans Bugzilla.
Une vulnérabilité non spécifiée permet à un utilisateur de récupérer les privilèges d'un autre compte.
Une erreur dans la validation de certaines entrées non spécifiées par l'éditeur permet d'insérer du contenu et des en-têtes arbitraires dans la réponse retournée par le serveur à l'utilisateur.
D'autres vulnérabilités permettant l'injection de code indirecte à distance et l'injection de requêtes illégitime par rebond ont également été corrigées.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Bugzilla versions 4.x ant\u00e9rieures \u00e0 la version 4.0rc2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Bugzilla versions 3.2.x ant\u00e9rieures \u00e0 la version 3.2.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Bugzilla versions 3.6.x ant\u00e9rieures \u00e0 la version 3.6.4 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Bugzilla versions 3.4.x ant\u00e9rieures \u00e0 la version 3.4.10 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Bugzilla.\n\nUne vuln\u00e9rabilit\u00e9 non sp\u00e9cifi\u00e9e permet \u00e0 un utilisateur de r\u00e9cup\u00e9rer les\nprivil\u00e8ges d\u0027un autre compte.\n\nUne erreur dans la validation de certaines entr\u00e9es non sp\u00e9cifi\u00e9es par\nl\u0027\u00e9diteur permet d\u0027ins\u00e9rer du contenu et des en-t\u00eates arbitraires dans\nla r\u00e9ponse retourn\u00e9e par le serveur \u00e0 l\u0027utilisateur.\n\nD\u0027autres vuln\u00e9rabilit\u00e9s permettant l\u0027injection de code indirecte \u00e0\ndistance et l\u0027injection de requ\u00eates ill\u00e9gitime par rebond ont \u00e9galement\n\u00e9t\u00e9 corrig\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-4568",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4568"
},
{
"name": "CVE-2010-4411",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4411"
},
{
"name": "CVE-2010-4570",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4570"
},
{
"name": "CVE-2011-0048",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0048"
},
{
"name": "CVE-2011-0046",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0046"
},
{
"name": "CVE-2010-4572",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4572"
},
{
"name": "CVE-2010-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2761"
},
{
"name": "CVE-2010-4567",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4567"
},
{
"name": "CVE-2010-4569",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4569"
}
],
"initial_release_date": "2011-01-25T00:00:00",
"last_revision_date": "2011-01-25T00:00:00",
"links": [],
"reference": "CERTA-2011-AVI-031",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-01-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Bugzilla. L\u0027une d\u0027entre\nelles permet \u00e0 un utilisateur de r\u00e9cup\u00e9rer les privil\u00e8ges d\u0027un autre\ncompte.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Bugzilla",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Bugzilla du 24 janvier 2011",
"url": "http://www.bugzilla.org/security/3.2.9/"
}
]
}
GSD-2010-2761
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2010-2761",
"description": "The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.",
"id": "GSD-2010-2761",
"references": [
"https://www.suse.com/security/cve/CVE-2010-2761.html",
"https://access.redhat.com/errata/RHSA-2011:1797",
"https://access.redhat.com/errata/RHSA-2011:0558",
"https://linux.oracle.com/cve/CVE-2010-2761.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2010-2761"
],
"details": "The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.",
"id": "GSD-2010-2761",
"modified": "2023-12-13T01:21:31.385271Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-2761",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm",
"refsource": "CONFIRM",
"url": "http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm"
},
{
"name": "RHSA-2011:1797",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1797.html"
},
{
"name": "SUSE-SR:2011:001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
},
{
"name": "FEDORA-2011-0653",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html"
},
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name": "[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/01/2"
},
{
"name": "69588",
"refsource": "OSVDB",
"url": "http://osvdb.org/69588"
},
{
"name": "43165",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43165"
},
{
"name": "[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/01/3"
},
{
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=591165",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=591165"
},
{
"name": "https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380",
"refsource": "CONFIRM",
"url": "https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380"
},
{
"name": "http://www.bugzilla.org/security/3.2.9/",
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security/3.2.9/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=600464",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=600464"
},
{
"name": "FEDORA-2011-0741",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html"
},
{
"name": "SUSE-SR:2011:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "ADV-2011-0271",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0271"
},
{
"name": "43033",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43033"
},
{
"name": "ADV-2011-0207",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0207"
},
{
"name": "42877",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42877"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1",
"refsource": "CONFIRM",
"url": "http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1"
},
{
"name": "ADV-2011-0249",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0249"
},
{
"name": "FEDORA-2011-0755",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html"
},
{
"name": "MDVSA-2010:250",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:250"
},
{
"name": "http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html",
"refsource": "CONFIRM",
"url": "http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html"
},
{
"name": "MDVSA-2010:237",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:237"
},
{
"name": "69589",
"refsource": "OSVDB",
"url": "http://osvdb.org/69589"
},
{
"name": "ADV-2011-0076",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0076"
},
{
"name": "[oss-security] 20101201 CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/01/1"
},
{
"name": "http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes",
"refsource": "CONFIRM",
"url": "http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes"
},
{
"name": "FEDORA-2011-0631",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "43147",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43147"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.49",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.93:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.85:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.84:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.77:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.76:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.752:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.69:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:1.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:1.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.97:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.96:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.89:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.88:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.81:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.66:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.65:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.58:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:1.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:1.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:1.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:1.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.99:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.98:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.83:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.82:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.751:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.68:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.67:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.59:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:1.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:1.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:1.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:1.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:3.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.95:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.94:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.87:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.86:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.79:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.78:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.71:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.64:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:1.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi.pm:1.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:0.078:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:0.080:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:1.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:1.103:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:1.111:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.112",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:0.83:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:1.107:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:1.108:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:0.081:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:0.082:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:1.104:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:1.105:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:1.106:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:0.079:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:1.109:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:andy_armstrong:cgi-simple:1.110:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-2761"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380"
},
{
"name": "http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes",
"refsource": "CONFIRM",
"tags": [],
"url": "http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes"
},
{
"name": "[oss-security] 20101201 CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2010/12/01/1"
},
{
"name": "http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html"
},
{
"name": "http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm"
},
{
"name": "http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1"
},
{
"name": "[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"refsource": "MLIST",
"tags": [],
"url": "http://openwall.com/lists/oss-security/2010/12/01/2"
},
{
"name": "[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2010/12/01/3"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=600464",
"refsource": "MISC",
"tags": [],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=600464"
},
{
"name": "69588",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/69588"
},
{
"name": "69589",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/69589"
},
{
"name": "SUSE-SR:2011:001",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
},
{
"name": "MDVSA-2010:237",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:237"
},
{
"name": "ADV-2011-0076",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2011/0076"
},
{
"name": "MDVSA-2010:250",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:250"
},
{
"name": "42877",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/42877"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=591165",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=591165"
},
{
"name": "ADV-2011-0207",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2011/0207"
},
{
"name": "http://www.bugzilla.org/security/3.2.9/",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.bugzilla.org/security/3.2.9/"
},
{
"name": "43033",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/43033"
},
{
"name": "FEDORA-2011-0653",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html"
},
{
"name": "43147",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/43147"
},
{
"name": "FEDORA-2011-0631",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html"
},
{
"name": "ADV-2011-0249",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2011/0249"
},
{
"name": "ADV-2011-0271",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2011/0271"
},
{
"name": "FEDORA-2011-0755",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html"
},
{
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "43165",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/43165"
},
{
"name": "43068",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/43068"
},
{
"name": "FEDORA-2011-0741",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html"
},
{
"name": "RHSA-2011:1797",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1797.html"
},
{
"name": "SUSE-SR:2011:005",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735",
"refsource": "CONFIRM",
"tags": [],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
"refsource": "CONFIRM",
"tags": [],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2016-12-08T03:01Z",
"publishedDate": "2010-12-06T20:12Z"
}
}
}
FKIE_CVE-2010-2761
Vulnerability from fkie_nvd - Published: 2010-12-06 20:12 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes | ||
| cve@mitre.org | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
| cve@mitre.org | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735 | ||
| cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html | ||
| cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html | ||
| cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html | ||
| cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html | ||
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html | ||
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html | ||
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html | ||
| cve@mitre.org | http://openwall.com/lists/oss-security/2010/12/01/1 | Patch | |
| cve@mitre.org | http://openwall.com/lists/oss-security/2010/12/01/2 | ||
| cve@mitre.org | http://openwall.com/lists/oss-security/2010/12/01/3 | Patch | |
| cve@mitre.org | http://osvdb.org/69588 | ||
| cve@mitre.org | http://osvdb.org/69589 | ||
| cve@mitre.org | http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm | Patch | |
| cve@mitre.org | http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1 | Patch | |
| cve@mitre.org | http://secunia.com/advisories/42877 | ||
| cve@mitre.org | http://secunia.com/advisories/43033 | ||
| cve@mitre.org | http://secunia.com/advisories/43068 | ||
| cve@mitre.org | http://secunia.com/advisories/43147 | ||
| cve@mitre.org | http://secunia.com/advisories/43165 | ||
| cve@mitre.org | http://www.bugzilla.org/security/3.2.9/ | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2010:237 | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2010:250 | ||
| cve@mitre.org | http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html | Patch | |
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2011-1797.html | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2011/0076 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2011/0207 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2011/0212 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2011/0249 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2011/0271 | ||
| cve@mitre.org | https://bugzilla.mozilla.org/show_bug.cgi?id=591165 | ||
| cve@mitre.org | https://bugzilla.mozilla.org/show_bug.cgi?id=600464 | ||
| cve@mitre.org | https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2010/12/01/1 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2010/12/01/2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2010/12/01/3 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/69588 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/69589 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42877 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43033 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43068 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43147 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43165 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.bugzilla.org/security/3.2.9/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:237 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:250 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-1797.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0076 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0207 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0212 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0249 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0271 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=591165 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=600464 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380 | Patch |
| Vendor | Product | Version | |
|---|---|---|---|
| andy_armstrong | cgi.pm | * | |
| andy_armstrong | cgi.pm | 1.4 | |
| andy_armstrong | cgi.pm | 1.42 | |
| andy_armstrong | cgi.pm | 1.43 | |
| andy_armstrong | cgi.pm | 1.44 | |
| andy_armstrong | cgi.pm | 1.45 | |
| andy_armstrong | cgi.pm | 1.50 | |
| andy_armstrong | cgi.pm | 1.51 | |
| andy_armstrong | cgi.pm | 1.52 | |
| andy_armstrong | cgi.pm | 1.53 | |
| andy_armstrong | cgi.pm | 1.54 | |
| andy_armstrong | cgi.pm | 1.55 | |
| andy_armstrong | cgi.pm | 1.56 | |
| andy_armstrong | cgi.pm | 1.57 | |
| andy_armstrong | cgi.pm | 2.0 | |
| andy_armstrong | cgi.pm | 2.01 | |
| andy_armstrong | cgi.pm | 2.13 | |
| andy_armstrong | cgi.pm | 2.14 | |
| andy_armstrong | cgi.pm | 2.15 | |
| andy_armstrong | cgi.pm | 2.16 | |
| andy_armstrong | cgi.pm | 2.17 | |
| andy_armstrong | cgi.pm | 2.18 | |
| andy_armstrong | cgi.pm | 2.19 | |
| andy_armstrong | cgi.pm | 2.20 | |
| andy_armstrong | cgi.pm | 2.21 | |
| andy_armstrong | cgi.pm | 2.22 | |
| andy_armstrong | cgi.pm | 2.23 | |
| andy_armstrong | cgi.pm | 2.24 | |
| andy_armstrong | cgi.pm | 2.25 | |
| andy_armstrong | cgi.pm | 2.26 | |
| andy_armstrong | cgi.pm | 2.27 | |
| andy_armstrong | cgi.pm | 2.28 | |
| andy_armstrong | cgi.pm | 2.29 | |
| andy_armstrong | cgi.pm | 2.30 | |
| andy_armstrong | cgi.pm | 2.31 | |
| andy_armstrong | cgi.pm | 2.32 | |
| andy_armstrong | cgi.pm | 2.33 | |
| andy_armstrong | cgi.pm | 2.34 | |
| andy_armstrong | cgi.pm | 2.35 | |
| andy_armstrong | cgi.pm | 2.36 | |
| andy_armstrong | cgi.pm | 2.37 | |
| andy_armstrong | cgi.pm | 2.38 | |
| andy_armstrong | cgi.pm | 2.39 | |
| andy_armstrong | cgi.pm | 2.40 | |
| andy_armstrong | cgi.pm | 2.41 | |
| andy_armstrong | cgi.pm | 2.42 | |
| andy_armstrong | cgi.pm | 2.43 | |
| andy_armstrong | cgi.pm | 2.44 | |
| andy_armstrong | cgi.pm | 2.45 | |
| andy_armstrong | cgi.pm | 2.46 | |
| andy_armstrong | cgi.pm | 2.47 | |
| andy_armstrong | cgi.pm | 2.48 | |
| andy_armstrong | cgi.pm | 2.49 | |
| andy_armstrong | cgi.pm | 2.50 | |
| andy_armstrong | cgi.pm | 2.51 | |
| andy_armstrong | cgi.pm | 2.52 | |
| andy_armstrong | cgi.pm | 2.53 | |
| andy_armstrong | cgi.pm | 2.54 | |
| andy_armstrong | cgi.pm | 2.55 | |
| andy_armstrong | cgi.pm | 2.56 | |
| andy_armstrong | cgi.pm | 2.57 | |
| andy_armstrong | cgi.pm | 2.58 | |
| andy_armstrong | cgi.pm | 2.59 | |
| andy_armstrong | cgi.pm | 2.60 | |
| andy_armstrong | cgi.pm | 2.61 | |
| andy_armstrong | cgi.pm | 2.62 | |
| andy_armstrong | cgi.pm | 2.63 | |
| andy_armstrong | cgi.pm | 2.64 | |
| andy_armstrong | cgi.pm | 2.65 | |
| andy_armstrong | cgi.pm | 2.66 | |
| andy_armstrong | cgi.pm | 2.67 | |
| andy_armstrong | cgi.pm | 2.68 | |
| andy_armstrong | cgi.pm | 2.69 | |
| andy_armstrong | cgi.pm | 2.70 | |
| andy_armstrong | cgi.pm | 2.71 | |
| andy_armstrong | cgi.pm | 2.72 | |
| andy_armstrong | cgi.pm | 2.73 | |
| andy_armstrong | cgi.pm | 2.74 | |
| andy_armstrong | cgi.pm | 2.75 | |
| andy_armstrong | cgi.pm | 2.76 | |
| andy_armstrong | cgi.pm | 2.77 | |
| andy_armstrong | cgi.pm | 2.78 | |
| andy_armstrong | cgi.pm | 2.79 | |
| andy_armstrong | cgi.pm | 2.80 | |
| andy_armstrong | cgi.pm | 2.81 | |
| andy_armstrong | cgi.pm | 2.82 | |
| andy_armstrong | cgi.pm | 2.83 | |
| andy_armstrong | cgi.pm | 2.84 | |
| andy_armstrong | cgi.pm | 2.85 | |
| andy_armstrong | cgi.pm | 2.86 | |
| andy_armstrong | cgi.pm | 2.87 | |
| andy_armstrong | cgi.pm | 2.88 | |
| andy_armstrong | cgi.pm | 2.89 | |
| andy_armstrong | cgi.pm | 2.90 | |
| andy_armstrong | cgi.pm | 2.91 | |
| andy_armstrong | cgi.pm | 2.92 | |
| andy_armstrong | cgi.pm | 2.93 | |
| andy_armstrong | cgi.pm | 2.94 | |
| andy_armstrong | cgi.pm | 2.95 | |
| andy_armstrong | cgi.pm | 2.96 | |
| andy_armstrong | cgi.pm | 2.97 | |
| andy_armstrong | cgi.pm | 2.98 | |
| andy_armstrong | cgi.pm | 2.99 | |
| andy_armstrong | cgi.pm | 2.751 | |
| andy_armstrong | cgi.pm | 2.752 | |
| andy_armstrong | cgi.pm | 3.00 | |
| andy_armstrong | cgi.pm | 3.01 | |
| andy_armstrong | cgi.pm | 3.02 | |
| andy_armstrong | cgi.pm | 3.03 | |
| andy_armstrong | cgi.pm | 3.04 | |
| andy_armstrong | cgi.pm | 3.05 | |
| andy_armstrong | cgi.pm | 3.06 | |
| andy_armstrong | cgi.pm | 3.07 | |
| andy_armstrong | cgi.pm | 3.08 | |
| andy_armstrong | cgi.pm | 3.09 | |
| andy_armstrong | cgi.pm | 3.10 | |
| andy_armstrong | cgi.pm | 3.11 | |
| andy_armstrong | cgi.pm | 3.12 | |
| andy_armstrong | cgi.pm | 3.13 | |
| andy_armstrong | cgi.pm | 3.14 | |
| andy_armstrong | cgi.pm | 3.15 | |
| andy_armstrong | cgi.pm | 3.16 | |
| andy_armstrong | cgi.pm | 3.17 | |
| andy_armstrong | cgi.pm | 3.18 | |
| andy_armstrong | cgi.pm | 3.19 | |
| andy_armstrong | cgi.pm | 3.20 | |
| andy_armstrong | cgi.pm | 3.21 | |
| andy_armstrong | cgi.pm | 3.22 | |
| andy_armstrong | cgi.pm | 3.23 | |
| andy_armstrong | cgi.pm | 3.24 | |
| andy_armstrong | cgi.pm | 3.25 | |
| andy_armstrong | cgi.pm | 3.26 | |
| andy_armstrong | cgi.pm | 3.27 | |
| andy_armstrong | cgi.pm | 3.28 | |
| andy_armstrong | cgi.pm | 3.29 | |
| andy_armstrong | cgi.pm | 3.30 | |
| andy_armstrong | cgi.pm | 3.31 | |
| andy_armstrong | cgi.pm | 3.32 | |
| andy_armstrong | cgi.pm | 3.33 | |
| andy_armstrong | cgi.pm | 3.34 | |
| andy_armstrong | cgi.pm | 3.35 | |
| andy_armstrong | cgi.pm | 3.36 | |
| andy_armstrong | cgi.pm | 3.37 | |
| andy_armstrong | cgi.pm | 3.38 | |
| andy_armstrong | cgi.pm | 3.39 | |
| andy_armstrong | cgi.pm | 3.40 | |
| andy_armstrong | cgi.pm | 3.41 | |
| andy_armstrong | cgi.pm | 3.42 | |
| andy_armstrong | cgi.pm | 3.43 | |
| andy_armstrong | cgi.pm | 3.44 | |
| andy_armstrong | cgi.pm | 3.45 | |
| andy_armstrong | cgi.pm | 3.46 | |
| andy_armstrong | cgi.pm | 3.47 | |
| andy_armstrong | cgi.pm | 3.48 | |
| andy_armstrong | cgi-simple | * | |
| andy_armstrong | cgi-simple | 0.078 | |
| andy_armstrong | cgi-simple | 0.079 | |
| andy_armstrong | cgi-simple | 0.080 | |
| andy_armstrong | cgi-simple | 0.081 | |
| andy_armstrong | cgi-simple | 0.082 | |
| andy_armstrong | cgi-simple | 0.83 | |
| andy_armstrong | cgi-simple | 1.0 | |
| andy_armstrong | cgi-simple | 1.1 | |
| andy_armstrong | cgi-simple | 1.1.1 | |
| andy_armstrong | cgi-simple | 1.1.2 | |
| andy_armstrong | cgi-simple | 1.103 | |
| andy_armstrong | cgi-simple | 1.104 | |
| andy_armstrong | cgi-simple | 1.105 | |
| andy_armstrong | cgi-simple | 1.106 | |
| andy_armstrong | cgi-simple | 1.107 | |
| andy_armstrong | cgi-simple | 1.108 | |
| andy_armstrong | cgi-simple | 1.109 | |
| andy_armstrong | cgi-simple | 1.110 | |
| andy_armstrong | cgi-simple | 1.111 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E20D5E8-10F6-4B3F-907B-5468D3BB4AC4",
"versionEndIncluding": "3.49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "59B846E0-BF7F-4535-ABB0-4A8069E6AAA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:1.42:*:*:*:*:*:*:*",
"matchCriteriaId": "37812E3C-0F0B-44ED-B96D-B7160E62E70E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "4DF1A898-9663-4C9F-BC31-E3AD28B4388F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "27A93905-4CAC-4D11-81A4-E27F1EDB41EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:1.45:*:*:*:*:*:*:*",
"matchCriteriaId": "55275EDA-ECFA-4569-A865-9BFD28BA6B8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:1.50:*:*:*:*:*:*:*",
"matchCriteriaId": "39741EBF-DDE7-41BC-9F72-03AD11F4C9BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:1.51:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4E891E-1B05-48D0-B090-D29B1E5692CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:1.52:*:*:*:*:*:*:*",
"matchCriteriaId": "711401D5-C463-4E8B-B194-0717651ACC78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:1.53:*:*:*:*:*:*:*",
"matchCriteriaId": "104FE050-AA99-42F4-AE92-A696A9AA4DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:1.54:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1D739D-C758-48EB-AF17-492A6304A2BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:1.55:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FE7698-5B36-4E72-A53B-F87AD51EBD2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:1.56:*:*:*:*:*:*:*",
"matchCriteriaId": "09093061-28B6-4FF5-A72B-4F91787986D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:1.57:*:*:*:*:*:*:*",
"matchCriteriaId": "6FBF48EA-5977-4849-B240-CBCB045A79E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5208F25D-AEDA-495E-BF06-4751BD77150B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "D35B9456-70D3-4CF7-A1C4-964455C5208B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "550CAC56-6DF4-43D5-A395-B18CB16B6E81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "E39631C0-4BE0-4FAB-95D0-663643C5620D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "10B0385D-48F8-465A-9637-4A4A20B3C5A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B0F1850E-390E-4D15-A552-C184B40277C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "09D2CEE1-F3B6-4DA0-9DE3-C6197354CA22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "97E06518-923C-4DA9-8451-2F56E3B3E59A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "8AF5157D-741F-4D0E-AC9D-553A076A1FF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "65CCC4EB-082A-4D31-98D9-22089580DBD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "FCFF70A8-B425-4D94-825D-FBB743FC8052",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "8C183279-80AE-4FEE-95A3-7B291245A9ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "5988C49D-B070-4CC2-8C25-5E911A7D73A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "EECD86BB-1585-47CA-B797-2A413786799E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "B666488B-412E-4A72-B27B-C8F046D4B49B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "F00BAC21-9C67-489F-8F9B-79275D5F6539",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "3CA274F5-4F9D-40F4-8B0B-3C586A648E80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "086D53BA-AC97-4DD0-B06F-5713387B3630",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "5CEDB9EB-C840-469E-81F2-BA0C710192E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "2C83539A-F459-4387-A98E-123E56151439",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.31:*:*:*:*:*:*:*",
"matchCriteriaId": "223D9CA6-D88C-43A4-8B2E-2F98F56C3AAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.32:*:*:*:*:*:*:*",
"matchCriteriaId": "E153C549-3798-4AEB-B1E8-2BD83F8D1A4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.33:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4FAD39-A275-42D3-84B5-8A798D0075AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.34:*:*:*:*:*:*:*",
"matchCriteriaId": "DB45C8C8-9EDD-437D-8514-C380633A9B20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.35:*:*:*:*:*:*:*",
"matchCriteriaId": "C3295F4B-064E-455E-9B9E-C671688D8A7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.36:*:*:*:*:*:*:*",
"matchCriteriaId": "E433A072-EBA4-41DC-8FA5-5DA32C2CA0C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.37:*:*:*:*:*:*:*",
"matchCriteriaId": "C0179DE4-940E-4A41-8126-7A0AB7C9F28D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.38:*:*:*:*:*:*:*",
"matchCriteriaId": "11ED8725-6D73-45F5-B833-13BCC9E2201F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.39:*:*:*:*:*:*:*",
"matchCriteriaId": "EFC2D385-9FDD-429E-A9B1-369A175BB229",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "5F7CD8DC-69A6-4EAA-BD91-26370D7BF395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FFC8447C-EBCF-4D44-B43C-EC6BD75AC068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "ED66BCC1-D212-43EE-822F-C2E6BB0B1CB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.43:*:*:*:*:*:*:*",
"matchCriteriaId": "5D53297E-E35B-44B9-A400-E55E5A38B143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.44:*:*:*:*:*:*:*",
"matchCriteriaId": "C43C7BD0-58D6-429A-AC39-CA4CC1A0104D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.45:*:*:*:*:*:*:*",
"matchCriteriaId": "21C3E14B-62A3-4146-AF92-43FA0FDCF78E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.46:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F37496-4EA4-4A29-BABD-EC572A13CC36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.47:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC6F3E1-3F48-4F5F-BDCA-4FF886A84FF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.48:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2A0FD4-12D6-406E-9173-7132958A2E13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.49:*:*:*:*:*:*:*",
"matchCriteriaId": "591591DC-805B-4028-9114-AC1403A3D284",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "5C901B1F-AA91-4AAE-B2C4-1E20B9A453E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "DD512456-CD6D-44D8-8143-9F4B0B3C7DB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "B7093E29-50BC-4495-A4C9-02A27F9A0DF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.53:*:*:*:*:*:*:*",
"matchCriteriaId": "8F4DE297-5D2D-4244-AD40-3A1BA79391AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.54:*:*:*:*:*:*:*",
"matchCriteriaId": "E1213E7E-7C8A-44B2-9B00-971F47088F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.55:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA2D166-D9C6-49C1-9D75-4D7347507F87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.56:*:*:*:*:*:*:*",
"matchCriteriaId": "8CEEFC9F-7DC7-4FDE-B6B0-0BF0998B9267",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.57:*:*:*:*:*:*:*",
"matchCriteriaId": "B5619CC7-051C-4E66-A22D-6AC65965E74D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.58:*:*:*:*:*:*:*",
"matchCriteriaId": "92B18751-4419-4ED3-9EE9-9AEA7FE31C69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.59:*:*:*:*:*:*:*",
"matchCriteriaId": "DDBE7139-2263-4B5B-9843-14214E9AAE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "F6C27803-6AC0-4CC8-AAD6-447C2BD726B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "94F24B1B-BB10-42CA-BD86-CCC237325BA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "41054C2C-92C4-4222-8DDC-1B788C7BE4A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "E8D61299-9A05-4800-B3A3-A64977664559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.64:*:*:*:*:*:*:*",
"matchCriteriaId": "0C2EDAEF-B40A-437A-B30A-A5EF9B54752B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.65:*:*:*:*:*:*:*",
"matchCriteriaId": "B62273AD-F3FC-4EDA-A3DB-4082C89C27DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.66:*:*:*:*:*:*:*",
"matchCriteriaId": "4C07FA63-F744-497D-A251-4491DBA49AC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.67:*:*:*:*:*:*:*",
"matchCriteriaId": "47D4D43B-1347-43B3-980A-44859A1BB8A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.68:*:*:*:*:*:*:*",
"matchCriteriaId": "97054639-45E1-405D-ADDC-B452D11DB8A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.69:*:*:*:*:*:*:*",
"matchCriteriaId": "B43E6CC8-A09E-43C4-B851-D25C24C3A4C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "3D01EEBB-D8B2-45FA-8925-8AE779A57682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.71:*:*:*:*:*:*:*",
"matchCriteriaId": "F6CF59A2-936F-40F7-A727-25E6B6AC9748",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "58B24B8A-328E-4434-9D02-4B6D5FF2F9F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "6B7D2ED6-CBA2-46EA-ADAA-7F59B3B09FAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "27BEADE4-AE41-486F-918D-5BC86346F22D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF31759-B531-48D3-9625-4AED09632A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.76:*:*:*:*:*:*:*",
"matchCriteriaId": "978642D9-5330-4241-A5B3-E07794BF0B34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.77:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4CF987-E4AA-4489-9CC5-C0868BBD7617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.78:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5FA7E2-B41A-4E3B-971C-EAE051CEEA77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.79:*:*:*:*:*:*:*",
"matchCriteriaId": "FBC8E0E4-C542-4012-9335-A561162B1E1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.80:*:*:*:*:*:*:*",
"matchCriteriaId": "F28335C7-5FB4-4777-8481-E1D3EDE6C143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.81:*:*:*:*:*:*:*",
"matchCriteriaId": "10C3ED14-191F-4E16-8101-FAEB8717CDFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.82:*:*:*:*:*:*:*",
"matchCriteriaId": "B1ACE21F-3B1B-41C0-A087-D48AAB2D79AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.83:*:*:*:*:*:*:*",
"matchCriteriaId": "86D391A4-CA61-4EDB-BD09-0E69ADC93306",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.84:*:*:*:*:*:*:*",
"matchCriteriaId": "D33AB5F1-8856-4F3D-A3C8-619BD5B897BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.85:*:*:*:*:*:*:*",
"matchCriteriaId": "EBED7E87-D862-4ECB-98E9-0BA10606F1A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.86:*:*:*:*:*:*:*",
"matchCriteriaId": "D471DB42-E992-4EEC-8F0B-A0FD7AC29EF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.87:*:*:*:*:*:*:*",
"matchCriteriaId": "E4F4B2B6-A72C-4319-B65F-294DE27F77A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.88:*:*:*:*:*:*:*",
"matchCriteriaId": "ECD471B9-2075-416D-AD87-3F826F38FAC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.89:*:*:*:*:*:*:*",
"matchCriteriaId": "641FD677-43BB-4796-B8F3-EEC282E118A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.90:*:*:*:*:*:*:*",
"matchCriteriaId": "415285DD-A6EF-4D11-9077-2BC6BE12D5EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.91:*:*:*:*:*:*:*",
"matchCriteriaId": "418D4B38-93A1-465F-A8DD-433F8371F071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.92:*:*:*:*:*:*:*",
"matchCriteriaId": "98B2CA97-9140-4492-A342-B63F3647786A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.93:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C58B61-1531-4779-B04F-03D1FDFFE512",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.94:*:*:*:*:*:*:*",
"matchCriteriaId": "757861AE-4B07-4C63-B381-4A9E33A913F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.95:*:*:*:*:*:*:*",
"matchCriteriaId": "F047C787-2D66-4E65-995E-7F7AF26C83EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.96:*:*:*:*:*:*:*",
"matchCriteriaId": "75CADE1E-7220-4A8C-A88E-634C705B955D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.97:*:*:*:*:*:*:*",
"matchCriteriaId": "42B8AEA7-9555-42BB-83F6-8CDF2A45E27A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.98:*:*:*:*:*:*:*",
"matchCriteriaId": "BCEFE536-5E0D-4A9F-AA0C-7442C364931A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "9127D899-998F-4D1E-A883-D90D039BFF40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.751:*:*:*:*:*:*:*",
"matchCriteriaId": "299BB424-8871-460C-95B0-7AD990A4F2C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:2.752:*:*:*:*:*:*:*",
"matchCriteriaId": "001AFBC4-C744-4254-B7CB-E0EB2C4E0FD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.00:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE30199-A513-44F3-9F8A-053E1D8853A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "27CFEFC4-BC57-4A29-8938-D69E149A772C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "C8AE6355-2F22-4338-9B64-9429DFE7B192",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.03:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C55E48-24B4-40FE-B398-2A9FC690B078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "87518DE5-F1C6-4296-9DF9-DA4FE3D29E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.05:*:*:*:*:*:*:*",
"matchCriteriaId": "1EE610EC-660C-4651-AF61-BE86835CE819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.06:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFCE75A-BED9-4A8B-A77A-45031C369C89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.07:*:*:*:*:*:*:*",
"matchCriteriaId": "4A874002-E4FA-4D58-985A-38C0144A17F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.08:*:*:*:*:*:*:*",
"matchCriteriaId": "BDA7F11A-0EBA-4055-BE91-615287759273",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.09:*:*:*:*:*:*:*",
"matchCriteriaId": "F297D7BB-7BC6-45DB-98F9-F910F564E29D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E5D06357-6EFB-451E-84B2-B6B0C3751322",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "4AEAFAA4-A504-4830-8772-E04ABB8ABA94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "B9932AD0-2EB8-46F9-B2A2-CEA5F2B86613",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "51602911-C72B-443F-8430-3E0137D25FF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "8CC3430F-9ABA-49D2-9BDD-2D62EDE8903F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "9D799737-46ED-4F5E-896A-98B8615F58EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "16BBFF40-8130-466B-80BE-FF499BD5D6DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "65113484-56AC-46C0-BF32-4A6E0506543C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "8D66440A-ADFC-4739-AD3F-16BD9322B5BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "35790EB9-4E91-4C74-973D-9F2D929CE177",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.20:*:*:*:*:*:*:*",
"matchCriteriaId": "4FAF06A7-A4BF-4FF0-AFF8-5490E9F3C3E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.21:*:*:*:*:*:*:*",
"matchCriteriaId": "D18B6CC6-6738-43D1-89CC-35E75AC6D372",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.22:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B8AC1E-1203-4857-A2D8-8DF7589A9B6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.23:*:*:*:*:*:*:*",
"matchCriteriaId": "2AE3CA84-F19B-4DBC-B3AA-F576011FBF6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.24:*:*:*:*:*:*:*",
"matchCriteriaId": "DE8ED0AD-F102-4D0D-84A6-753C9DCE29E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.25:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC87749-E547-435D-BFCA-C4EB8FA3F52E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.26:*:*:*:*:*:*:*",
"matchCriteriaId": "F9B6599A-69AD-4C30-9BE2-4392B92D63E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.27:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC41A36-22ED-4140-BCE1-72FD600814C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.28:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A0369A-A65F-4FE1-AAB3-FE5D07F3BD83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.29:*:*:*:*:*:*:*",
"matchCriteriaId": "472F63BB-E8CE-4AFD-804C-89D180D1A8D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.30:*:*:*:*:*:*:*",
"matchCriteriaId": "45B118D0-B093-421F-AAB3-1298A26F1162",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.31:*:*:*:*:*:*:*",
"matchCriteriaId": "7E33BF7B-C086-4E72-9DE4-8264F50845F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.32:*:*:*:*:*:*:*",
"matchCriteriaId": "0BAAF493-0460-40C8-9173-736582EF1AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.33:*:*:*:*:*:*:*",
"matchCriteriaId": "610C9B3E-0D2F-4881-9BE1-A60E484D5C08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.34:*:*:*:*:*:*:*",
"matchCriteriaId": "9AFD56E7-732A-45FE-B17B-46280F988058",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.35:*:*:*:*:*:*:*",
"matchCriteriaId": "07FEC5A4-D662-4FDE-B9BA-53BCFEC5F521",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.36:*:*:*:*:*:*:*",
"matchCriteriaId": "4F141F5D-4E41-4180-9413-D201EF57992C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.37:*:*:*:*:*:*:*",
"matchCriteriaId": "79E16F80-C2A5-4859-89EC-E46FD371670A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.38:*:*:*:*:*:*:*",
"matchCriteriaId": "932FFD59-B45F-44F1-8C48-4815BDEBFB30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.39:*:*:*:*:*:*:*",
"matchCriteriaId": "A890611B-A162-4CDF-AB59-F6A9683399AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.40:*:*:*:*:*:*:*",
"matchCriteriaId": "45258F98-8CC4-4B27-BEE6-638A19F75674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.41:*:*:*:*:*:*:*",
"matchCriteriaId": "7DCC040A-3F5C-4CCC-9540-5A61FF4F3098",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.42:*:*:*:*:*:*:*",
"matchCriteriaId": "6B17E4CB-AEEA-489F-8601-D2D7614FF2EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.43:*:*:*:*:*:*:*",
"matchCriteriaId": "B1C58D73-C864-48A6-B120-70111B6DC255",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.44:*:*:*:*:*:*:*",
"matchCriteriaId": "341B12EC-F089-4D13-9CE1-F6C77F63EFEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.45:*:*:*:*:*:*:*",
"matchCriteriaId": "EDEBF3C6-26B2-45BE-B440-94FA0E4A699D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.46:*:*:*:*:*:*:*",
"matchCriteriaId": "03513BD7-FABA-4B49-AA42-0EFDDA8EE245",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.47:*:*:*:*:*:*:*",
"matchCriteriaId": "9A251F28-FCEA-4B0F-AEC9-32916CD464E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi.pm:3.48:*:*:*:*:*:*:*",
"matchCriteriaId": "BD434B97-08D6-4533-BAE0-53EF94BBECA4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F492844C-491A-4124-B0F4-677A7F6295B8",
"versionEndIncluding": "1.112",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:0.078:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D0AD63-ADB5-49A1-A947-C6B8DD2380D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:0.079:*:*:*:*:*:*:*",
"matchCriteriaId": "933D7C72-F3EE-4037-8E2B-B1A316A1B21A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:0.080:*:*:*:*:*:*:*",
"matchCriteriaId": "6E4627D1-2F49-4631-8621-0ED00809546E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:0.081:*:*:*:*:*:*:*",
"matchCriteriaId": "FCCD9748-7429-4753-8D9B-4A18F3A1E5FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:0.082:*:*:*:*:*:*:*",
"matchCriteriaId": "86C63243-6170-4E49-8ED8-A49A78EC1D27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:0.83:*:*:*:*:*:*:*",
"matchCriteriaId": "E3C6D841-7D30-48A0-B5B7-44A0DD80A378",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8CE0E5A0-1AB2-47B7-97D4-7C86851CC568",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D5997A75-9A73-4C90-B522-D33618D55BA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3A447F-3203-44BD-95C6-C351ED458CA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7C07267B-323F-4529-A7E6-AE8DE80D79DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:1.103:*:*:*:*:*:*:*",
"matchCriteriaId": "04EF4A44-56C1-4078-A04F-80073290462B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:1.104:*:*:*:*:*:*:*",
"matchCriteriaId": "0AC0DCD5-2689-4556-A346-59F563F39E9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:1.105:*:*:*:*:*:*:*",
"matchCriteriaId": "1432A51A-99D6-4D6C-8EF2-E8BBA8A7A222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:1.106:*:*:*:*:*:*:*",
"matchCriteriaId": "A8718571-C8D1-4337-BF12-396D764E2173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:1.107:*:*:*:*:*:*:*",
"matchCriteriaId": "69E512FF-25E0-4365-8CC0-6BA835A3B7F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:1.108:*:*:*:*:*:*:*",
"matchCriteriaId": "5B5D2AAA-C707-473F-83C5-5ACA4A2C8C35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:1.109:*:*:*:*:*:*:*",
"matchCriteriaId": "D3FBF0F5-7C52-4CB8-8F3C-0173E692E774",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:1.110:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CC27CA-9852-4F69-B1E6-518ED2CED10B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:andy_armstrong:cgi-simple:1.111:*:*:*:*:*:*:*",
"matchCriteriaId": "3BDCE5D0-A7FB-4F20-8418-C3B6E1005E0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172."
},
{
"lang": "es",
"value": "La funci\u00f3n multipart_init de (1) CGI.pm en versiones anteriores a la 3.50 y (2) Simple.pm de CGI::Simple 1.112 y versiones anteriores usa un valor est\u00e1tico (\"hardcoded\") en la cadena de l\u00edmite MIME en el contenido multipart/x-mixed-replace. Lo que permite a atacantes remotos inyectar cabeceras HTTP de su elecci\u00f3n y realizar ataques de divisi\u00f3n de respuestas HTTP a trav\u00e9s de una entrada modificada que contiene este valor. Una vulnerabilidad distinta a la CVE-2010-3172."
}
],
"id": "CVE-2010-2761",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-12-06T20:12:58.653",
"references": [
{
"source": "cve@mitre.org",
"url": "http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes"
},
{
"source": "cve@mitre.org",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"source": "cve@mitre.org",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2010/12/01/1"
},
{
"source": "cve@mitre.org",
"url": "http://openwall.com/lists/oss-security/2010/12/01/2"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2010/12/01/3"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/69588"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/69589"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/42877"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/43033"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/43068"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/43147"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/43165"
},
{
"source": "cve@mitre.org",
"url": "http://www.bugzilla.org/security/3.2.9/"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:237"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:250"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1797.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2011/0076"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2011/0207"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2011/0249"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2011/0271"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=591165"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=600464"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2010/12/01/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://openwall.com/lists/oss-security/2010/12/01/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2010/12/01/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/69588"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/69589"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/42877"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/43033"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/43068"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/43147"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/43165"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.bugzilla.org/security/3.2.9/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:237"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:250"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1797.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2011/0076"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2011/0207"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2011/0249"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2011/0271"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=591165"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=600464"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-8X6H-GQ6J-8X3J
Vulnerability from github – Published: 2022-05-17 03:23 – Updated: 2025-04-11 03:41The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
{
"affected": [],
"aliases": [
"CVE-2010-2761"
],
"database_specific": {
"cwe_ids": [
"CWE-94"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2010-12-06T20:12:00Z",
"severity": "MODERATE"
},
"details": "The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.",
"id": "GHSA-8x6h-gq6j-8x3j",
"modified": "2025-04-11T03:41:34Z",
"published": "2022-05-17T03:23:46Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2761"
},
{
"type": "WEB",
"url": "https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=591165"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=600464"
},
{
"type": "WEB",
"url": "http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes"
},
{
"type": "WEB",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"type": "WEB",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"type": "WEB",
"url": "http://openwall.com/lists/oss-security/2010/12/01/1"
},
{
"type": "WEB",
"url": "http://openwall.com/lists/oss-security/2010/12/01/2"
},
{
"type": "WEB",
"url": "http://openwall.com/lists/oss-security/2010/12/01/3"
},
{
"type": "WEB",
"url": "http://osvdb.org/69588"
},
{
"type": "WEB",
"url": "http://osvdb.org/69589"
},
{
"type": "WEB",
"url": "http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm"
},
{
"type": "WEB",
"url": "http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/42877"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/43033"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/43068"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/43147"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/43165"
},
{
"type": "WEB",
"url": "http://www.bugzilla.org/security/3.2.9"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:237"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:250"
},
{
"type": "WEB",
"url": "http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1797.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0076"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0207"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0249"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0271"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.