FKIE_CVE-2008-1502

Vulnerability from fkie_nvd - Published: 2008-03-25 19:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols.
References
cve@mitre.orghttp://docs.moodle.org/en/Release_Notes#Moodle_1.8.5Patch, Vendor Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html
cve@mitre.orghttp://secunia.com/advisories/29491Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30073Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30986Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31017Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31018Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31167
cve@mitre.orghttp://secunia.com/advisories/32400Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/32446Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1691Patch
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1871
cve@mitre.orghttp://www.egroupware.org/changelog
cve@mitre.orghttp://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110Exploit
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200805-04.xml
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/07/08/14
cve@mitre.orghttp://www.securityfocus.com/bid/28424Patch
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0989/referencesVendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41435
cve@mitre.orghttps://usn.ubuntu.com/658-1/
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html
af854a3a-2127-422b-91ae-364da2661108http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29491Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30073Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30986Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31017Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31018Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31167
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32400Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32446Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1691Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1871
af854a3a-2127-422b-91ae-364da2661108http://www.egroupware.org/changelog
af854a3a-2127-422b-91ae-364da2661108http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/07/08/14
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28424Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0989/referencesVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41435
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/658-1/
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:egroupware:egroupware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E631688-AC1D-45BE-91A4-B126DD4032CA",
              "versionEndIncluding": "1.4.002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:egroupware:egroupware:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E440ECF0-C87D-432B-91D6-C1D61FF780C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:egroupware:egroupware:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "598C8726-BD8E-41F5-8A83-E06CF6F24C8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:egroupware:egroupware:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E91357C7-8028-4870-AEDB-DACEC0EE1E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:egroupware:egroupware:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CE992D5-371B-466C-8A08-884B146694D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:egroupware:egroupware:1.2.106-2:*:*:*:*:*:*:*",
              "matchCriteriaId": "40CF5935-81F4-427F-9D0F-65B5521AF8D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:egroupware:egroupware:1.4.001:*:*:*:*:*:*:*",
              "matchCriteriaId": "F22F0392-6D7A-4133-83AA-C14F1B69A167",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55AB250C-A3A0-4BC2-AC96-5B41F60E4E25",
              "versionEndIncluding": "1.8.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "044E2E34-470C-45C9-8136-22493077D842",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5FB2555-7146-4A75-9D24-250BBC09244A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "949F0BC0-A79E-4B1D-894D-650CF68109F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "616AE17F-F5B4-4D64-B287-0AAB189C802A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "74246580-F351-4EAE-9406-2386CFF1819D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "077FFAAB-BACD-43F4-B146-DBFFD58CE619",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C715839-F020-4F42-94F0-9FA34F294578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3113CF64-DFDD-413F-BB85-5A8B251608D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "99CFB2E0-B99B-4154-8A6E-B6A8483ACEBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F8CC3-5428-4F72-B4DC-299A50EE9C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28252347-44DD-4302-8170-21DDB0A3B3A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "740F27D0-4E66-4E2C-A2AB-54F5211F796F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA227895-91FF-4689-A03A-D712EAB5E369",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C42DBF05-906B-47E6-BC75-50EBA38B72BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.5.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "D6A58D43-9AB1-4EEA-8E5D-7829AFAE11D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6C3409E-47BF-4D01-ADAC-58475E5D3077",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E38AF73-EA00-485F-A63B-7C05AD9C948E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BD9A00-DA61-4389-8731-B92585C2BE6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "680CE396-5F61-409C-A152-4D1E1CB44EA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6A0F31A-BB19-4B2C-A2CD-1DFA5FDF1C72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CA6482-0B84-463D-9C81-A92FFC06C9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0794B997-0793-4465-B9BA-5BFF254D600A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "06F4A1D8-65C5-4EDA-BCEC-CD267DE5C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB2A20C9-5FEF-4D91-AFA0-B49672CC8B37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCFEA024-4CA7-4975-802C-1BB9C099C164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E5E19D-BC58-478E-A584-6D260A5C5265",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB16198E-A32D-4CFA-9CCE-65871596E6AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABFE9D24-24DB-49EA-B59E-AF9B47D46EB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "56551145-5213-4165-88C9-C351DACDD1C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A589727E-92BB-40DA-8172-89279EB9B73C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "92E97539-A7CC-48D3-A897-ADE4BC194B2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D19C1954-6330-449D-9101-378D5DBD122C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "492A28FE-A2F8-4FF7-AC5B-0C3F5508506D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A897CA-3D8F-4575-BBD2-1C0C5A2ECC99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A3A5D9-D96E-46B3-AC22-25045564EB96",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n _bad_protocol_once en el archivo phpgwapi/inc/class.kses.inc.php en KSES, como es usado en eGroupWare versiones anteriores a 1.4.003, Moodle versiones anteriores a 1.8.5 y otros productos, permite a los atacantes remotos omitir el filtrado de HTML y conducir ataques de tipo cross-site scripting (XSS) por medio de una cadena que contiene protocolos URL especialmente dise\u00f1ados."
    }
  ],
  "id": "CVE-2008-1502",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-03-25T19:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29491"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30073"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30986"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31017"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31018"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31167"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32400"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32446"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1691"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1871"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.egroupware.org/changelog"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625\u0026r2=25110\u0026pathrev=25110"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/07/08/14"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/28424"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0989/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41435"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/658-1/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29491"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30986"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31017"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32400"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32446"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1871"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.egroupware.org/changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625\u0026r2=25110\u0026pathrev=25110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/07/08/14"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/28424"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0989/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41435"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/658-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…