CVE-2007-2260 (GCVE-0-2007-2260)

Vulnerability from cvelistv5 – Published: 2007-04-25 17:00 – Updated: 2024-08-07 13:33
VLAI?
Summary
Multiple PHP remote file inclusion vulnerabilities in bibtex mase beta 2.0 allow remote attackers to execute arbitrary PHP code via a URL in the bibtexrootrel parameter to (1) unavailable.php, (2) source.php, (3) log.php, (4) latex.php, (5) indexinfo.php, (6) index.php, (7) importinfo.php, (8) import.php, (9) examplefile.php, (10) clearinfo.php, (11) clear.php, (12) aboutinfo.php, (13) about.php, and other unspecified files.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://osvdb.org/35628 vdb-entryx_refsource_OSVDB
http://osvdb.org/35624 vdb-entryx_refsource_OSVDB
http://osvdb.org/35631 vdb-entryx_refsource_OSVDB
http://osvdb.org/35633 vdb-entryx_refsource_OSVDB
http://osvdb.org/35629 vdb-entryx_refsource_OSVDB
http://osvdb.org/35622 vdb-entryx_refsource_OSVDB
http://osvdb.org/35621 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/466683/100… mailing-listx_refsource_BUGTRAQ
http://osvdb.org/35625 vdb-entryx_refsource_OSVDB
http://osvdb.org/35623 vdb-entryx_refsource_OSVDB
http://osvdb.org/35632 vdb-entryx_refsource_OSVDB
http://securityreason.com/securityalert/2624 third-party-advisoryx_refsource_SREASON
http://osvdb.org/35626 vdb-entryx_refsource_OSVDB
http://osvdb.org/35630 vdb-entryx_refsource_OSVDB
http://osvdb.org/35627 vdb-entryx_refsource_OSVDB
Date Public ?
2007-04-22 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:33:28.150Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "35628",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35628"
          },
          {
            "name": "35624",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35624"
          },
          {
            "name": "35631",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35631"
          },
          {
            "name": "35633",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35633"
          },
          {
            "name": "35629",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35629"
          },
          {
            "name": "35622",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35622"
          },
          {
            "name": "35621",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35621"
          },
          {
            "name": "20070422 bibtex mase Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/466683/100/0/threaded"
          },
          {
            "name": "35625",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35625"
          },
          {
            "name": "35623",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35623"
          },
          {
            "name": "35632",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35632"
          },
          {
            "name": "2624",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2624"
          },
          {
            "name": "35626",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35626"
          },
          {
            "name": "35630",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35630"
          },
          {
            "name": "35627",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35627"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-22T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple PHP remote file inclusion vulnerabilities in bibtex mase beta 2.0 allow remote attackers to execute arbitrary PHP code via a URL in the bibtexrootrel parameter to (1) unavailable.php, (2) source.php, (3) log.php, (4) latex.php, (5) indexinfo.php, (6) index.php, (7) importinfo.php, (8) import.php, (9) examplefile.php, (10) clearinfo.php, (11) clear.php, (12) aboutinfo.php, (13) about.php, and other unspecified files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "35628",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35628"
        },
        {
          "name": "35624",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35624"
        },
        {
          "name": "35631",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35631"
        },
        {
          "name": "35633",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35633"
        },
        {
          "name": "35629",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35629"
        },
        {
          "name": "35622",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35622"
        },
        {
          "name": "35621",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35621"
        },
        {
          "name": "20070422 bibtex mase Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/466683/100/0/threaded"
        },
        {
          "name": "35625",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35625"
        },
        {
          "name": "35623",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35623"
        },
        {
          "name": "35632",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35632"
        },
        {
          "name": "2624",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2624"
        },
        {
          "name": "35626",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35626"
        },
        {
          "name": "35630",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35630"
        },
        {
          "name": "35627",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35627"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2260",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple PHP remote file inclusion vulnerabilities in bibtex mase beta 2.0 allow remote attackers to execute arbitrary PHP code via a URL in the bibtexrootrel parameter to (1) unavailable.php, (2) source.php, (3) log.php, (4) latex.php, (5) indexinfo.php, (6) index.php, (7) importinfo.php, (8) import.php, (9) examplefile.php, (10) clearinfo.php, (11) clear.php, (12) aboutinfo.php, (13) about.php, and other unspecified files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "35628",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35628"
            },
            {
              "name": "35624",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35624"
            },
            {
              "name": "35631",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35631"
            },
            {
              "name": "35633",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35633"
            },
            {
              "name": "35629",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35629"
            },
            {
              "name": "35622",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35622"
            },
            {
              "name": "35621",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35621"
            },
            {
              "name": "20070422 bibtex mase Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/466683/100/0/threaded"
            },
            {
              "name": "35625",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35625"
            },
            {
              "name": "35623",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35623"
            },
            {
              "name": "35632",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35632"
            },
            {
              "name": "2624",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2624"
            },
            {
              "name": "35626",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35626"
            },
            {
              "name": "35630",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35630"
            },
            {
              "name": "35627",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35627"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2260",
    "datePublished": "2007-04-25T17:00:00.000Z",
    "dateReserved": "2007-04-25T00:00:00.000Z",
    "dateUpdated": "2024-08-07T13:33:28.150Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2007-2260",
      "date": "2026-05-08",
      "epss": "0.02462",
      "percentile": "0.85342"
    },
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bibtex:mase:2.0_beta:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C540CEE5-8053-49B0-A60A-A60041438CB5\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple PHP remote file inclusion vulnerabilities in bibtex mase beta 2.0 allow remote attackers to execute arbitrary PHP code via a URL in the bibtexrootrel parameter to (1) unavailable.php, (2) source.php, (3) log.php, (4) latex.php, (5) indexinfo.php, (6) index.php, (7) importinfo.php, (8) import.php, (9) examplefile.php, (10) clearinfo.php, (11) clear.php, (12) aboutinfo.php, (13) about.php, and other unspecified files.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades de inclusi\\u00f3n remota de archivo en PHP en bibtex mase beta 2.0 permite a atacantes remotos ejecutar c\\u00f3digo PHP de su elecci\\u00f3n mediante una URL en el par\\u00e1metro bibtexrootrel a (1) unavailable.php, (2) source.php, (3) log.php, (4) latex.php, (5) indexinfo.php, (6) index.php, (7) importinfo.php, (8) import.php, (9) examplefile.php, (10) clearinfo.php, (11) clear.php, (12) aboutinfo.php, (13) about.php, y otros ficheros no especificados.\"}]",
      "id": "CVE-2007-2260",
      "lastModified": "2024-11-21T00:30:19.907",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}",
      "published": "2007-04-25T17:19:00.000",
      "references": "[{\"url\": \"http://osvdb.org/35621\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/35622\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/35623\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/35624\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/35625\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/35626\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/35627\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/35628\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/35629\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/35630\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/35631\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/35632\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/35633\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securityreason.com/securityalert/2624\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/466683/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/35621\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/35622\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/35623\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/35624\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/35625\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/35626\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/35627\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/35628\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/35629\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/35630\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/35631\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/35632\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/35633\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securityreason.com/securityalert/2624\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/466683/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-94\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-2260\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-04-25T17:19:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple PHP remote file inclusion vulnerabilities in bibtex mase beta 2.0 allow remote attackers to execute arbitrary PHP code via a URL in the bibtexrootrel parameter to (1) unavailable.php, (2) source.php, (3) log.php, (4) latex.php, (5) indexinfo.php, (6) index.php, (7) importinfo.php, (8) import.php, (9) examplefile.php, (10) clearinfo.php, (11) clear.php, (12) aboutinfo.php, (13) about.php, and other unspecified files.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de archivo en PHP en bibtex mase beta 2.0 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en el par\u00e1metro bibtexrootrel a (1) unavailable.php, (2) source.php, (3) log.php, (4) latex.php, (5) indexinfo.php, (6) index.php, (7) importinfo.php, (8) import.php, (9) examplefile.php, (10) clearinfo.php, (11) clear.php, (12) aboutinfo.php, (13) about.php, y otros ficheros no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bibtex:mase:2.0_beta:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C540CEE5-8053-49B0-A60A-A60041438CB5\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/35621\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/35622\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/35623\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/35624\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/35625\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/35626\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/35627\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/35628\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/35629\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/35630\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/35631\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/35632\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/35633\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/2624\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/466683/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/35621\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/35622\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/35623\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/35624\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/35625\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/35626\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/35627\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/35628\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/35629\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/35630\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/35631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/35632\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/35633\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/2624\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/466683/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…