CVE-2012-2738 (GCVE-0-2012-2738)

Vulnerability from cvelistv5 – Published: 2012-07-22 16:00 – Updated: 2024-08-06 19:42
VLAI?
Summary
The VteTerminal in gnome-terminal (vte) before 0.32.2 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.368Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2012-9575",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083403.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=676090"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.changes"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.news"
          },
          {
            "name": "54281",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/54281"
          },
          {
            "name": "[oss-security] 20120615 Re: CVE Request -- mosh (and probably vte too): mosh server DoS (long loop) due improper parsing of terminal parameters in terminal dispatcher",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/06/15/11"
          },
          {
            "name": "[oss-security] 20120522 Re: CVE Request -- mosh (and probably vte too): mosh server DoS (long loop) due improper parsing of terminal parameters in terminal dispatcher",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/23/6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
          },
          {
            "name": "openSUSE-SU-2012:0931",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00001.html"
          },
          {
            "name": "FEDORA-2012-9546",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083398.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The VteTerminal in gnome-terminal (vte) before 0.32.2 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-24T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2012-9575",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083403.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=676090"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.changes"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.news"
        },
        {
          "name": "54281",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/54281"
        },
        {
          "name": "[oss-security] 20120615 Re: CVE Request -- mosh (and probably vte too): mosh server DoS (long loop) due improper parsing of terminal parameters in terminal dispatcher",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/06/15/11"
        },
        {
          "name": "[oss-security] 20120522 Re: CVE Request -- mosh (and probably vte too): mosh server DoS (long loop) due improper parsing of terminal parameters in terminal dispatcher",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/23/6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
        },
        {
          "name": "openSUSE-SU-2012:0931",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00001.html"
        },
        {
          "name": "FEDORA-2012-9546",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083398.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-2738",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The VteTerminal in gnome-terminal (vte) before 0.32.2 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2012-9575",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083403.html"
            },
            {
              "name": "https://bugzilla.gnome.org/show_bug.cgi?id=676090",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.gnome.org/show_bug.cgi?id=676090"
            },
            {
              "name": "http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.changes",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.changes"
            },
            {
              "name": "http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.news",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.news"
            },
            {
              "name": "54281",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/54281"
            },
            {
              "name": "[oss-security] 20120615 Re: CVE Request -- mosh (and probably vte too): mosh server DoS (long loop) due improper parsing of terminal parameters in terminal dispatcher",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/06/15/11"
            },
            {
              "name": "[oss-security] 20120522 Re: CVE Request -- mosh (and probably vte too): mosh server DoS (long loop) due improper parsing of terminal parameters in terminal dispatcher",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/05/23/6"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
            },
            {
              "name": "openSUSE-SU-2012:0931",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00001.html"
            },
            {
              "name": "FEDORA-2012-9546",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083398.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2738",
    "datePublished": "2012-07-22T16:00:00",
    "dateReserved": "2012-05-14T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.368Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-2738\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-07-22T16:55:25.743\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The VteTerminal in gnome-terminal (vte) before 0.32.2 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value.\"},{\"lang\":\"es\",\"value\":\"El VteTerminal en gnome-terminal (vte), anterior a v0.32.2 permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (bucle largo y el consumo de la CPU) a trav\u00e9s de una secuencia de escape con un valor de n\u00famero de repeticiones de gran tama\u00f1o.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.32.1\",\"matchCriteriaId\":\"909C2FA5-6F29-4AFC-AA08-311AEE5EC3CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"441D23C6-554D-440D-B37E-BCB56AE8DD3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA8683CB-758B-40E0-A52F-E5E92DA8FE3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0FB66B4-32AE-4AF6-B831-F797367F1161\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF95225B-A572-4239-A122-CAD4F8AB1815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE5F0D3-D15F-48A1-A7A4-AF287B9CC568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6269F1-EDE6-4F2F-9DD3-4CB29A8F9C67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"230B901C-0761-4C97-8C51-A9F0C02D86AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9063AF-8D0F-4692-B6BF-6EEAF14DD5AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B7BD79-C18D-4AC1-8F69-E57A9522F6E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7648580-F66E-42D4-8A31-E55BC9591BBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA27A3BF-A5A3-4BB3-8530-F2391A9539C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B7E958B-C7A8-442B-B94C-A3B75BD18640\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C2A5C4-DD53-4CE2-A483-7A7013301C99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41559C8D-21E2-40BC-A3AE-57CBC03496A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2736063B-2112-430A-99BD-98C02A572910\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EFCA40D-7663-4054-9C10-C16FDBC12854\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F3F1E8A-2D6E-4DD3-BB99-B8CF0C0F827E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3567026-6124-46A9-8271-7EAB553A018C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3965EAF8-7CAD-434C-895E-AD6F0BE06055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC9F965C-EA42-4216-BAAB-6201068548D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD678C79-45AB-4DF9-AF0C-7388D99184E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC75543-7764-4468-979B-965736FCAD17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21FAF964-0510-4FDE-817F-9917E5E2E203\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"647C0C74-AE29-488D-9888-8CD066347318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5DE9D61-D826-4973-8066-31395040C24F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF034FC4-3280-42D7-AA6A-EC8B4F71BBA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB1D2A73-E68C-467F-9CFE-D00FA0882F0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C91AD8D9-3120-4DF8-98A5-5409D3F3CEED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"927CA5AF-3B52-4D07-B8A7-3CD17C35FB36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.10.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CAA9146-D038-4B91-A7BB-9350D849FEE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"506C1C01-1464-4E30-8A64-5B03BBE22D95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D10A48B-06F0-44B1-998F-55278BEBA3BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D711082F-F5FA-4BB0-A367-D6058F2FE70A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D738B0B-5436-47C6-B308-4911558F2BA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"543E6797-ABB3-4300-882D-A19F344CE721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"523D2F23-7ADC-485C-B627-93E7645DA6D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"896C5957-2B36-402D-99A7-0239B3920553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA09C349-198D-4C32-A644-10D8744FD866\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06106A85-F672-443C-A61B-0D89A947BBDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25A7CF8D-6D69-4A9D-9DAC-EB7F96EC343E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C57DECF7-1E22-4E7C-84D3-DC72EFAE9F8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDCB6BA7-6C9D-41AB-8D59-B0D5A596B53A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18E0351F-1761-4B2F-AC92-8CB9BEC23476\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70CD6FD0-2CBF-428F-B8C5-D80A028A5CC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AC605AB-78B0-4F3D-AEC3-DD330C6E4A69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A42A6FB-FEBA-4AC3-9212-274EA7FA0EFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F6A8D3B-3612-47EF-9A94-0C087570FA36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DA650A2-B32F-45C4-AC02-7F9A02744C63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD2F3DDB-68D3-4E3B-94A4-ACC0F6C1D18F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DF5B61B-2B45-46C6-8B00-06BD2E4B5DEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91AED696-1ACD-466B-8F59-39473B21AE86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.11.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CBB9AD-5118-4484-A265-6DF819C111B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76DBF229-51CB-4326-AF9B-C45265AAE56B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02762FA8-8CD9-4596-9348-61391703B8E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE63886D-928A-4F30-8547-20B19D406EA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9E70281-2908-4B75-9617-DA599DF3CBA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09404021-07F0-4E06-B2CB-E970103E725C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"892B5844-F535-4909-AD60-4E2D0325A504\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9221517-4D28-43C5-9EB0-CEA041C1C98C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"908D28F1-FD1D-4563-92D1-540AC0D371A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AF55AB6-DD7C-4698-87A2-AAA3739C3400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.13.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD4CE95-2AD6-4A2F-80BC-79EB85250762\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.13.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28477982-ECEE-4F00-AAEF-1FF8A5870391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CEE5DD4-8B1F-48FD-B0E0-FF65F3600DDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93B2DF3D-E4E7-4077-9250-3AD91F510D1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1BC4612-2ACB-4087-A349-8E26AF1A3BF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7500A708-B2DB-49A8-823D-5632ECA92205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"590CACAF-061F-43DE-8A97-A66391CB23C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0755EBC4-AB9B-46B6-83A6-B27855449912\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A976550-68FB-4E8B-AC23-D0B15AF561F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"998C23BC-2DB7-49A5-A7E5-40B87350DC7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.15.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1096730-15C0-4799-BE40-DDDDA8D5FF39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.15.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72358EC0-27EE-4F34-9D34-9D1D6238010F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63357C91-EDB1-49C7-A298-71165701B7AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E037F2AB-2BE6-4EA3-9EE0-CEF67EF8E2E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6077C1D9-EEA8-4323-AFB4-237C5F44B31A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F22F368-F264-4FC5-9DF0-5849F953B75E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9AF3DB0-F60F-43C9-96A2-1EB8E008E7CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1111ADB2-1EDA-423F-9396-6C6AA660705F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0257157F-4D82-4F67-A8B7-0C7C43693159\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C6A2F1-1EFE-40F1-9571-CF0B1CF47BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49ACDF3C-91BE-491C-9D68-284A11540626\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F38D680-DA40-4E8D-BFFC-AD6A834D0779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B169381-FC65-4888-9A55-E55A84E7E9EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEDDEA62-9EB8-416D-A60C-F4D2E5F5C2C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CB120C5-DAD3-4520-8698-FDBE5291EA5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A04D599A-32DC-4013-B646-A0481219B180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.16.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C134DA96-4F89-47EA-9655-9D68FC5D86F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C9FD73-DF57-4539-8B8D-A4A8F8217379\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1986B191-AD90-4D2A-91FD-D4E113261FF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E54EF220-F79E-49ED-B05F-97AEF6C9BFDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80AD28D1-5CA8-446A-9D71-7051332DF9AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEA5CF07-E655-488D-9B6F-DF2EEDE0D616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55023B35-B7E7-4DDB-9D47-8FEB5B6537E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB0E25F-E8A3-4164-830A-AECFB33F0AFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15A4EFFE-4185-48AD-9D1A-9C699B03F8D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.20.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"032391DF-DDFF-4164-9F5F-BD957701305C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D51FE9-DEA4-425F-8A44-6FF8960945A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EAADFFD-89CC-4109-BBD9-4AC3460A1F79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6129D45-96B6-45FF-A65B-172D97807370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0CE2BF2-4F1B-4511-AA28-C456E53082E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1052E372-C3E9-4CF4-80AC-ED116CF37F94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E58C7EBB-E3E8-4955-AD8C-0E9035A31E2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25D4A583-14F0-49AD-897C-9909E7EE7675\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8400BDA6-508F-4A98-BA0A-714DB8663286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB5D16B6-C133-40A9-AB0D-442DF479047E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.21.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF851914-EB00-4131-AFF2-4B07AE1FC287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.21.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1B4FDE9-DD15-4A22-A467-7B61ADBECD7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.21.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A5B24CB-1907-4C2B-83D1-4E0C5E04D110\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.22.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08CB0567-D7AD-4B43-9779-7219370A6C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B136A5D4-5F8A-4D34-B07D-E3432C74EA1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65EC6272-3597-4559-A982-7123B37E343C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F898B66F-C80D-42AE-BFEC-01FD39E439D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9A9EE4D-C21D-4D8B-A444-95B4953D6D05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.22.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F3171C1-7888-43FC-A618-221F2B5D1174\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF5FF8AA-E496-4B6E-8A8C-6A4FB9A773E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF80EE05-EFC4-4B3A-89F8-D11FF119DD13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9870716-FEF3-49F9-8D1F-683B14E4D326\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00511CA7-4455-4E23-A01C-4FF68141B3B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"121F9AAB-798D-443B-84E0-5D00FB19D89E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.24.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35895153-46D0-45EF-9B5A-A3004D4A6B51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.24.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DDDF014-986C-4D76-BB9F-089AA4D467AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.24.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC614088-7F7D-4955-AD69-B23E59CC002E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.24.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66A6A608-AD4B-499F-BFE6-AD8DA79BE29F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.25.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"004C85EE-7881-4B03-8946-6E17F0D0A48C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.25.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFA71343-7B42-4379-AA79-6BF96CAF27AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.25.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B447A37-9B3F-4B00-B2CA-54C94838607D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.26.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0784DADA-0704-4D6C-9C94-D4D2B87CF886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.26.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA52905F-7D44-4AD4-B2A2-F7EBFFB5710D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.26.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F89D91AC-F997-43B5-A03E-12C680F0C438\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.27.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F86C20B5-7C2C-402B-9314-4251649FD54E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.27.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"536AC21D-8A2D-4A30-8EEC-4066DA6BD90E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.27.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFCFA210-62C8-48C2-B9FA-35B8588DF832\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.27.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3733BF-1658-4073-8995-77943F299F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.27.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F899EA08-53D3-46CC-9044-9C07CAC9A1FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.27.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0F0CB13-03E5-4A14-9342-AAC353B93A51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.27.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECBEB1F6-61A8-4A07-AAF1-81B02DE02F55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.28.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CECBE599-97F0-462E-A7E7-D4E61D5D132F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.28.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE97754-3BD3-4FC3-9BB5-5909E97EEC29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.28.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5C57478-7B7B-46C7-8107-6E35DCD9F72A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.29.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A43D1A4A-D2FD-40FC-BC5F-8E6B223DDCF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.29.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF5F52CC-D6BD-48CB-80FB-D4A89BAA8B4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.30.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85DD01FC-FCCF-4B0E-9005-08004125AD48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.30.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"291D048F-2BF5-44D7-843B-AC2DD5B4717C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.31.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E517622E-5691-41B2-A8BE-FE7B6E85D808\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nalin_dahyabhai:vte:0.32.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"548808AC-D680-4CD0-B8BD-C644C700BE07\"}]}]}],\"references\":[{\"url\":\"http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.changes\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.news\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083398.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083403.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2012-08/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/05/23/6\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/06/15/11\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/54281\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"https://bugzilla.gnome.org/show_bug.cgi?id=676090\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.changes\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.news\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083398.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083403.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2012-08/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/05/23/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/06/15/11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/54281\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://bugzilla.gnome.org/show_bug.cgi?id=676090\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…