WID-SEC-W-2025-2522

Vulnerability from csaf_certbund - Published: 2016-07-18 22:00 - Updated: 2025-11-10 23:00
Summary
Mehrere Webserver: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen

Notes

Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
PHP ist eine Programmiersprache, die zur Implementierung von Web-Applikationen genutzt wird. Apache Tomcat ist ein Web-Applikationsserver für verschiedene Plattformen. Apache ist ein Webserver für verschiedene Plattformen. Python ist eine universelle, üblicherweise interpretierte höhere Programmiersprache.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in mehreren Webserver Produkten ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- Linux - UNIX - Windows

{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "PHP ist eine Programmiersprache, die zur Implementierung von Web-Applikationen genutzt wird.\r\nApache Tomcat ist ein Web-Applikationsserver f\u00fcr verschiedene Plattformen.\r\nApache ist ein Webserver f\u00fcr verschiedene Plattformen.\r\nPython ist eine universelle, \u00fcblicherweise interpretierte h\u00f6here Programmiersprache.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in mehreren Webserver Produkten ausnutzen, um Sicherheitsvorkehrungen zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2025-2522 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2025-2522.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2025-2522 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2522"
      },
      {
        "category": "external",
        "summary": "Meldung auf httpoxy.org vom 2016-07-18",
        "url": "https://httpoxy.org/"
      },
      {
        "category": "external",
        "summary": "Cert.org Vulnerability Note VU#797896 vom 2016-07-18",
        "url": "http://www.kb.cert.org/vuls/id/797896"
      },
      {
        "category": "external",
        "summary": "Microsoft Knowledge Base article #3179800 vom 2016-07-18",
        "url": "https://support.microsoft.com/en-us/kb/3179800"
      },
      {
        "category": "external",
        "summary": "Meldung auf nginx.com vom 2016-07-18",
        "url": "https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/"
      },
      {
        "category": "external",
        "summary": "Meldung auf Apache.org vom 2016-07-18",
        "url": "https://www.apache.org/security/asf-httpoxy-response.txt"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-3038-1 vom 2016-07-18",
        "url": "http://www.ubuntu.com/usn/usn-3038-1/"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1420 vom 2016-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2016:1420"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1421 vom 2016-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2016:1421"
      },
      {
        "category": "external",
        "summary": "Red Hat Bugzilla #1353755 vom 2016-07-18",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-5387"
      },
      {
        "category": "external",
        "summary": "Debian Security Tracker CVE-2016-5387 vom 2016-07-18",
        "url": "https://security-tracker.debian.org/tracker/CVE-2016-5387"
      },
      {
        "category": "external",
        "summary": "Meldung auf der oss-sec Mailliste vom 2016-07-19",
        "url": "http://seclists.org/oss-sec/2016/q3/94"
      },
      {
        "category": "external",
        "summary": "CentOS Announce CESA-2016:1421 vom 2016-07-18",
        "url": "http://permalink.gmane.org/gmane.linux.centos.announce/9976"
      },
      {
        "category": "external",
        "summary": "CentOS Announce CESA-2016:1422 vom 2016-07-18",
        "url": "http://permalink.gmane.org/gmane.linux.centos.announce/9975"
      },
      {
        "category": "external",
        "summary": "Meldung auf der oss-sec Mailliste vom 2016-07-19",
        "url": "http://seclists.org/oss-sec/2016/q3/95"
      },
      {
        "category": "external",
        "summary": "Typo3 Core Security Advisory typo3-core-sa-2016-019 vom 2016-07-19",
        "url": "https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2016-019/"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-3623-1 vom 2016-07-20",
        "url": "https://lists.debian.org/debian-security-announce/2016/msg00201.html"
      },
      {
        "category": "external",
        "summary": "SUSE Patch vom 2016-07-20",
        "url": "https://download.suse.com/patch/finder/?keywords=a513b952ed04bce0c2391eb2ba3b9f2c"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-3631 vom 2016-07-27",
        "url": "https://www.debian.org/security/2016/dsa-3631"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-3045-1 vom 2016-08-02",
        "url": "http://www.ubuntu.com/usn/usn-3045-1/"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1538 vom 2016-08-03",
        "url": "https://rhn.redhat.com/errata/RHSA-2016-1538.html"
      },
      {
        "category": "external",
        "summary": "Unify Security Advisory Report - OBSO-1607-01 vom 2016-07-27",
        "url": "https://networks.unify.com/security/advisories/OBSO-1607-01.pdf"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1609 vom 2016-08-12",
        "url": "https://rhn.redhat.com/errata/RHSA-2016-1609.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1610 vom 2016-08-12",
        "url": "https://rhn.redhat.com/errata/RHSA-2016-1610.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1611 vom 2016-08-12",
        "url": "https://rhn.redhat.com/errata/RHSA-2016-1611.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1612 vom 2016-08-12",
        "url": "https://rhn.redhat.com/errata/RHSA-2016-1612.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1613 vom 2016-08-12",
        "url": "https://rhn.redhat.com/errata/RHSA-2016-1613.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2016:2090 vom 2016-08-17",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2016-August/002213.html"
      },
      {
        "category": "external",
        "summary": "RedHat Security Advisory RHSA-2016-1624",
        "url": "https://rhn.redhat.com/errata/RHSA-2016-1624.html"
      },
      {
        "category": "external",
        "summary": "RedHat Security Advisory RHSA-2016-1625",
        "url": "https://rhn.redhat.com/errata/RHSA-2016-1625.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1630-1 vom 2016-08-18",
        "url": "http://rhn.redhat.com/errata/RHSA-2016-1630.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1629-1 vom 2016-08-18",
        "url": "http://rhn.redhat.com/errata/RHSA-2016-1629.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1628-1 vom 2016-08-18",
        "url": "http://rhn.redhat.com/errata/RHSA-2016-1628.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1627-1 vom 2016-08-18",
        "url": "http://rhn.redhat.com/errata/RHSA-2016-1627.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1626-1 vom 2016-08-18",
        "url": "http://rhn.redhat.com/errata/RHSA-2016-1626.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2016:2106-1 vom 2016-08-19",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1650-1 vom 2016-08-22",
        "url": "https://rhn.redhat.com/errata/RHSA-2016-1650.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1649-1 vom 2016-08-22",
        "url": "https://rhn.redhat.com/errata/RHSA-2016-1649.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1648-1 vom 2016-08-22",
        "url": "https://rhn.redhat.com/errata/RHSA-2016-1648.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2016:2188-1 vom 2016-09-03",
        "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162188-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2016:2229-1 vom 2016-09-07",
        "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162229-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2016:2270-1 vom 2016-09-10",
        "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162270-1.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2016:1978 vom 2016-09-30",
        "url": "https://access.redhat.com/errata/RHSA-2016:1978"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2016:2653-1 vom 2016-10-26",
        "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162653-1.html"
      },
      {
        "category": "external",
        "summary": "HP Security Bulletin HPSBUX03665 vom 2016-11-07",
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05324759"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2016-2586 vom 2016-11-09",
        "url": "http://linux.oracle.com/errata/ELSA-2016-2586.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2016-2598 vom 2016-11-09",
        "url": "http://linux.oracle.com/errata/ELSA-2016-2598.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2016:2859-1 vom 2016-11-18",
        "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162859-1.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-3134-1 vom 2016-11-23",
        "url": "http://www.ubuntu.com/usn/usn-3134-1/"
      },
      {
        "category": "external",
        "summary": "Eintrag auf Apache.org",
        "url": "http://httpd.apache.org/security/vulnerabilities_24.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2017:0114-1 vom 2017-01-12",
        "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170114-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2017:0190-1 vom 2017-01-18",
        "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170190-1.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-3177-1 vom 2017-01-23",
        "url": "http://www.ubuntu.com/usn/usn-3177-1/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-3177-2 vom 2017-02-02",
        "url": "http://www.ubuntu.com/usn/usn-3177-2/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2017:1632-1 vom 2017-06-21",
        "url": "https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2017:1660-1 vom 2017-06-24",
        "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171660-1.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:0273 vom 2018-02-05",
        "url": "https://access.redhat.com/errata/RHSA-2018:0273"
      },
      {
        "category": "external",
        "summary": "Dell/EMC Knowledge Base Article: 000529947",
        "url": "https://support.emc.com/kb/529947"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:0223-1 vom 2019-02-01",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190223-1.html"
      },
      {
        "category": "external",
        "summary": "openSUSE Security Update OPENSUSE-SU-2025:15706-1 vom 2025-11-07",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2YFYRHG3D4WKV5P6XA25CFPNSEBUKHC/"
      }
    ],
    "source_lang": "en-US",
    "title": "Mehrere Webserver: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen",
    "tracking": {
      "current_release_date": "2025-11-10T23:00:00.000+00:00",
      "generator": {
        "date": "2025-11-11T06:37:21.182+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2025-2522",
      "initial_release_date": "2016-07-18T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2016-07-18T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initial Release"
        },
        {
          "date": "2016-07-18T22:00:00.000+00:00",
          "number": "2",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-07-18T22:00:00.000+00:00",
          "number": "3",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-07-18T22:00:00.000+00:00",
          "number": "4",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-07-19T22:00:00.000+00:00",
          "number": "5",
          "summary": "New remediations available"
        },
        {
          "date": "2016-07-20T22:00:00.000+00:00",
          "number": "6",
          "summary": "New remediations available"
        },
        {
          "date": "2016-07-20T22:00:00.000+00:00",
          "number": "7",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-07-27T22:00:00.000+00:00",
          "number": "8",
          "summary": "New remediations available"
        },
        {
          "date": "2016-07-27T22:00:00.000+00:00",
          "number": "9",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-08-02T22:00:00.000+00:00",
          "number": "10",
          "summary": "New remediations available"
        },
        {
          "date": "2016-08-02T22:00:00.000+00:00",
          "number": "11",
          "summary": "New remediations available"
        },
        {
          "date": "2016-08-02T22:00:00.000+00:00",
          "number": "12",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-08-11T22:00:00.000+00:00",
          "number": "13",
          "summary": "New remediations available"
        },
        {
          "date": "2016-08-11T22:00:00.000+00:00",
          "number": "14",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-08-11T22:00:00.000+00:00",
          "number": "15",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-08-11T22:00:00.000+00:00",
          "number": "16",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-08-11T22:00:00.000+00:00",
          "number": "17",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-08-17T22:00:00.000+00:00",
          "number": "18",
          "summary": "New remediations available"
        },
        {
          "date": "2016-08-17T22:00:00.000+00:00",
          "number": "19",
          "summary": "New remediations available"
        },
        {
          "date": "2016-08-17T22:00:00.000+00:00",
          "number": "20",
          "summary": "New remediations available"
        },
        {
          "date": "2016-08-18T22:00:00.000+00:00",
          "number": "21",
          "summary": "New remediations available"
        },
        {
          "date": "2016-08-18T22:00:00.000+00:00",
          "number": "22",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-08-21T22:00:00.000+00:00",
          "number": "23",
          "summary": "New remediations available"
        },
        {
          "date": "2016-08-21T22:00:00.000+00:00",
          "number": "24",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-08-22T22:00:00.000+00:00",
          "number": "25",
          "summary": "New remediations available"
        },
        {
          "date": "2016-08-22T22:00:00.000+00:00",
          "number": "26",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-08-22T22:00:00.000+00:00",
          "number": "27",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-09-04T22:00:00.000+00:00",
          "number": "28",
          "summary": "New remediations available"
        },
        {
          "date": "2016-09-04T22:00:00.000+00:00",
          "number": "29",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-09-06T22:00:00.000+00:00",
          "number": "30",
          "summary": "New remediations available"
        },
        {
          "date": "2016-09-11T22:00:00.000+00:00",
          "number": "31",
          "summary": "New remediations available"
        },
        {
          "date": "2016-10-03T22:00:00.000+00:00",
          "number": "32",
          "summary": "New remediations available"
        },
        {
          "date": "2016-10-03T22:00:00.000+00:00",
          "number": "33",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-10-03T22:00:00.000+00:00",
          "number": "34",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-10-03T22:00:00.000+00:00",
          "number": "35",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-10-03T22:00:00.000+00:00",
          "number": "36",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-10-03T22:00:00.000+00:00",
          "number": "37",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-10-26T22:00:00.000+00:00",
          "number": "38",
          "summary": "New remediations available"
        },
        {
          "date": "2016-11-06T23:00:00.000+00:00",
          "number": "39",
          "summary": "New remediations available"
        },
        {
          "date": "2016-11-06T23:00:00.000+00:00",
          "number": "40",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-11-09T23:00:00.000+00:00",
          "number": "41",
          "summary": "New remediations available"
        },
        {
          "date": "2016-11-20T23:00:00.000+00:00",
          "number": "42",
          "summary": "New remediations available"
        },
        {
          "date": "2016-11-22T23:00:00.000+00:00",
          "number": "43",
          "summary": "New remediations available"
        },
        {
          "date": "2016-11-22T23:00:00.000+00:00",
          "number": "44",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2016-12-20T23:00:00.000+00:00",
          "number": "45",
          "summary": "New remediations available"
        },
        {
          "date": "2017-01-12T23:00:00.000+00:00",
          "number": "46",
          "summary": "New remediations available"
        },
        {
          "date": "2017-01-18T23:00:00.000+00:00",
          "number": "47",
          "summary": "New remediations available"
        },
        {
          "date": "2017-01-23T23:00:00.000+00:00",
          "number": "48",
          "summary": "New remediations available"
        },
        {
          "date": "2017-02-02T23:00:00.000+00:00",
          "number": "49",
          "summary": "New remediations available"
        },
        {
          "date": "2017-06-20T22:00:00.000+00:00",
          "number": "50",
          "summary": "New remediations available"
        },
        {
          "date": "2017-06-20T22:00:00.000+00:00",
          "number": "51",
          "summary": "New remediations available"
        },
        {
          "date": "2017-06-20T22:00:00.000+00:00",
          "number": "52",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2017-06-26T22:00:00.000+00:00",
          "number": "53",
          "summary": "New remediations available"
        },
        {
          "date": "2017-08-07T22:00:00.000+00:00",
          "number": "54",
          "summary": "Added references"
        },
        {
          "date": "2019-01-30T23:00:00.000+00:00",
          "number": "55",
          "summary": "Neue Updates von EMC aufgenommen"
        },
        {
          "date": "2019-02-03T23:00:00.000+00:00",
          "number": "56",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-04-08T22:00:00.000+00:00",
          "number": "57",
          "summary": "Referenz(en) aufgenommen: FEDORA-2019-AA7F37CD4D"
        },
        {
          "date": "2025-11-09T23:00:00.000+00:00",
          "number": "58",
          "summary": "Neue Updates von openSUSE aufgenommen"
        },
        {
          "date": "2025-11-10T23:00:00.000+00:00",
          "number": "59",
          "summary": "Korrektur"
        }
      ],
      "status": "final",
      "version": "59"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Apache HTTP Server",
            "product": {
              "name": "Apache HTTP Server",
              "product_id": "67869",
              "product_identification_helper": {
                "cpe": "cpe:/a:apache:http_server:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Apache Tomcat",
            "product": {
              "name": "Apache Tomcat",
              "product_id": "643",
              "product_identification_helper": {
                "cpe": "cpe:/a:apache:tomcat:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Apache"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "EMC VNX1",
            "product": {
              "name": "EMC VNX1",
              "product_id": "T004667",
              "product_identification_helper": {
                "cpe": "cpe:/h:emc:vnx:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "EMC"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HPE HP-UX",
            "product": {
              "name": "HPE HP-UX",
              "product_id": "4871",
              "product_identification_helper": {
                "cpe": "cpe:/o:hp:hp-ux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HPE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source CentOS",
            "product": {
              "name": "Open Source CentOS",
              "product_id": "1727",
              "product_identification_helper": {
                "cpe": "cpe:/o:centos:centos:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source PHP",
            "product": {
              "name": "Open Source PHP",
              "product_id": "8746",
              "product_identification_helper": {
                "cpe": "cpe:/a:php:php:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source Python",
            "product": {
              "name": "Open Source Python",
              "product_id": "113051",
              "product_identification_helper": {
                "cpe": "cpe:/a:python:python:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Red Hat JBoss Web Server",
            "product": {
              "name": "Red Hat JBoss Web Server",
              "product_id": "T003426",
              "product_identification_helper": {
                "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "12 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Desktop 12 SP1",
                  "product_id": "T006804",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:linux_enterprise_desktop:12:sp1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Linux Enterprise Desktop"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "12 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP1",
                  "product_id": "T007836",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:linux_enterprise_server:12:sp1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Linux Enterprise Server"
          },
          {
            "category": "product_name",
            "name": "SUSE openSUSE",
            "product": {
              "name": "SUSE openSUSE",
              "product_id": "T027843",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:opensuse:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.2.1",
                "product": {
                  "name": "TYPO3 Core \u003c8.2.1",
                  "product_id": "T008046"
                }
              },
              {
                "category": "product_version",
                "name": "8.2.1",
                "product": {
                  "name": "TYPO3 Core 8.2.1",
                  "product_id": "T008046-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:typo3:typo3:8.2.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Core"
          }
        ],
        "category": "vendor",
        "name": "TYPO3"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "131442",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:10.04:-:lts"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-1000104",
      "product_status": {
        "known_affected": [
          "131442",
          "67646",
          "4871",
          "T004667",
          "67869",
          "T003426",
          "T007836",
          "T006804",
          "2951",
          "T002207",
          "643",
          "T027843",
          "8746",
          "1727",
          "T008046",
          "113051"
        ]
      },
      "release_date": "2016-07-18T22:00:00.000+00:00",
      "title": "CVE-2016-1000104"
    },
    {
      "cve": "CVE-2016-1000105",
      "product_status": {
        "known_affected": [
          "131442",
          "67646",
          "4871",
          "T004667",
          "67869",
          "T003426",
          "T007836",
          "T006804",
          "2951",
          "T002207",
          "643",
          "T027843",
          "8746",
          "1727",
          "T008046",
          "113051"
        ]
      },
      "release_date": "2016-07-18T22:00:00.000+00:00",
      "title": "CVE-2016-1000105"
    },
    {
      "cve": "CVE-2016-1000107",
      "product_status": {
        "known_affected": [
          "131442",
          "67646",
          "4871",
          "T004667",
          "67869",
          "T003426",
          "T007836",
          "T006804",
          "2951",
          "T002207",
          "643",
          "T027843",
          "8746",
          "1727",
          "T008046",
          "113051"
        ]
      },
      "release_date": "2016-07-18T22:00:00.000+00:00",
      "title": "CVE-2016-1000107"
    },
    {
      "cve": "CVE-2016-1000108",
      "product_status": {
        "known_affected": [
          "131442",
          "67646",
          "4871",
          "T004667",
          "67869",
          "T003426",
          "T007836",
          "T006804",
          "2951",
          "T002207",
          "643",
          "T027843",
          "8746",
          "1727",
          "T008046",
          "113051"
        ]
      },
      "release_date": "2016-07-18T22:00:00.000+00:00",
      "title": "CVE-2016-1000108"
    },
    {
      "cve": "CVE-2016-1000109",
      "product_status": {
        "known_affected": [
          "131442",
          "67646",
          "4871",
          "T004667",
          "67869",
          "T003426",
          "T007836",
          "T006804",
          "2951",
          "T002207",
          "643",
          "T027843",
          "8746",
          "1727",
          "T008046",
          "113051"
        ]
      },
      "release_date": "2016-07-18T22:00:00.000+00:00",
      "title": "CVE-2016-1000109"
    },
    {
      "cve": "CVE-2016-1000110",
      "product_status": {
        "known_affected": [
          "131442",
          "67646",
          "4871",
          "T004667",
          "67869",
          "T003426",
          "T007836",
          "T006804",
          "2951",
          "T002207",
          "643",
          "T027843",
          "8746",
          "1727",
          "T008046",
          "113051"
        ]
      },
      "release_date": "2016-07-18T22:00:00.000+00:00",
      "title": "CVE-2016-1000110"
    },
    {
      "cve": "CVE-2016-1000111",
      "product_status": {
        "known_affected": [
          "131442",
          "67646",
          "4871",
          "T004667",
          "67869",
          "T003426",
          "T007836",
          "T006804",
          "2951",
          "T002207",
          "643",
          "T027843",
          "8746",
          "1727",
          "T008046",
          "113051"
        ]
      },
      "release_date": "2016-07-18T22:00:00.000+00:00",
      "title": "CVE-2016-1000111"
    },
    {
      "cve": "CVE-2016-5385",
      "product_status": {
        "known_affected": [
          "131442",
          "67646",
          "4871",
          "T004667",
          "67869",
          "T003426",
          "T007836",
          "T006804",
          "2951",
          "T002207",
          "643",
          "T027843",
          "8746",
          "1727",
          "T008046",
          "113051"
        ]
      },
      "release_date": "2016-07-18T22:00:00.000+00:00",
      "title": "CVE-2016-5385"
    },
    {
      "cve": "CVE-2016-5386",
      "product_status": {
        "known_affected": [
          "131442",
          "67646",
          "4871",
          "T004667",
          "67869",
          "T003426",
          "T007836",
          "T006804",
          "2951",
          "T002207",
          "643",
          "T027843",
          "8746",
          "1727",
          "T008046",
          "113051"
        ]
      },
      "release_date": "2016-07-18T22:00:00.000+00:00",
      "title": "CVE-2016-5386"
    },
    {
      "cve": "CVE-2016-5387",
      "product_status": {
        "known_affected": [
          "131442",
          "67646",
          "4871",
          "T004667",
          "67869",
          "T003426",
          "T007836",
          "T006804",
          "2951",
          "T002207",
          "643",
          "T027843",
          "8746",
          "1727",
          "T008046",
          "113051"
        ]
      },
      "release_date": "2016-07-18T22:00:00.000+00:00",
      "title": "CVE-2016-5387"
    },
    {
      "cve": "CVE-2016-5388",
      "product_status": {
        "known_affected": [
          "131442",
          "67646",
          "4871",
          "T004667",
          "67869",
          "T003426",
          "T007836",
          "T006804",
          "2951",
          "T002207",
          "643",
          "T027843",
          "8746",
          "1727",
          "T008046",
          "113051"
        ]
      },
      "release_date": "2016-07-18T22:00:00.000+00:00",
      "title": "CVE-2016-5388"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…