CVE-2014-1610
Vulnerability from cvelistv5
Published
2014-01-30 23:00
Modified
2024-08-06 09:50
Severity ?
EPSS score ?
Summary
MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:50:09.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "31329", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/31329/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.checkpoint.com/threatcloud-central/articles/2014-01-28-tc-researchers-discover.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.checkpoint.com/defense/advisories/public/2014/cpai-26-jan.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=60339" }, { "name": "57472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57472" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/c/110215/" }, { "name": "DSA-2891", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2891" }, { "name": "[MediaWiki-announce] 20140128 MediaWiki Security Releases: 1.22.2, 1.21.5 and 1.19.11", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000140.html" }, { "name": "1029707", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029707" }, { "name": "65223", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65223" }, { "name": "FEDORA-2014-1802", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127942.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/c/110069/2/includes/media/Bitmap.php" }, { "name": "102631", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/102631" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=14361\u0026action=diff" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=14384\u0026action=diff" }, { "name": "56695", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56695" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/c/110069/" }, { "name": "102630", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/102630" }, { "name": "FEDORA-2014-1745", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127948.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-28T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-16T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "31329", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/31329/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.checkpoint.com/threatcloud-central/articles/2014-01-28-tc-researchers-discover.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.checkpoint.com/defense/advisories/public/2014/cpai-26-jan.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=60339" }, { "name": "57472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57472" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/#/c/110215/" }, { "name": "DSA-2891", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2891" }, { "name": "[MediaWiki-announce] 20140128 MediaWiki Security Releases: 1.22.2, 1.21.5 and 1.19.11", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000140.html" }, { "name": "1029707", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029707" }, { "name": "65223", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65223" }, { "name": "FEDORA-2014-1802", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127942.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/#/c/110069/2/includes/media/Bitmap.php" }, { "name": "102631", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/102631" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=14361\u0026action=diff" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=14384\u0026action=diff" }, { "name": "56695", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56695" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/#/c/110069/" }, { "name": "102630", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/102630" }, { "name": "FEDORA-2014-1745", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127948.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-1610", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "31329", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/31329/" }, { "name": "http://www.checkpoint.com/threatcloud-central/articles/2014-01-28-tc-researchers-discover.html", "refsource": "MISC", "url": "http://www.checkpoint.com/threatcloud-central/articles/2014-01-28-tc-researchers-discover.html" }, { "name": "http://www.checkpoint.com/defense/advisories/public/2014/cpai-26-jan.html", "refsource": "MISC", "url": "http://www.checkpoint.com/defense/advisories/public/2014/cpai-26-jan.html" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=60339", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=60339" }, { "name": "57472", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57472" }, { "name": "https://gerrit.wikimedia.org/r/#/c/110215/", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/#/c/110215/" }, { "name": "DSA-2891", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2891" }, { "name": "[MediaWiki-announce] 20140128 MediaWiki Security Releases: 1.22.2, 1.21.5 and 1.19.11", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000140.html" }, { "name": "1029707", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029707" }, { "name": "65223", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65223" }, { "name": "FEDORA-2014-1802", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127942.html" }, { "name": "https://gerrit.wikimedia.org/r/#/c/110069/2/includes/media/Bitmap.php", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/#/c/110069/2/includes/media/Bitmap.php" }, { "name": "102631", "refsource": "OSVDB", "url": "http://www.osvdb.org/102631" }, { "name": "https://bugzilla.wikimedia.org/attachment.cgi?id=14361\u0026action=diff", "refsource": "MISC", "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=14361\u0026action=diff" }, { "name": "https://bugzilla.wikimedia.org/attachment.cgi?id=14384\u0026action=diff", "refsource": "MISC", "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=14384\u0026action=diff" }, { "name": "56695", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56695" }, { "name": "https://gerrit.wikimedia.org/r/#/c/110069/", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/#/c/110069/" }, { "name": "102630", "refsource": "OSVDB", "url": "http://osvdb.org/102630" }, { "name": "FEDORA-2014-1745", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127948.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-1610", "datePublished": "2014-01-30T23:00:00", "dateReserved": "2014-01-19T00:00:00", "dateUpdated": "2024-08-06T09:50:09.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-1610\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-01-30T23:55:02.413\",\"lastModified\":\"2024-11-21T02:04:42.740\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php.\"},{\"lang\":\"es\",\"value\":\"MediaWiki 1.22.x en versiones anteriores a 1.22.2, 1.21.x en versiones anteriores a 1.21.5 y 1.19.x en versiones anteriores a 1.19.11, cuando el soporte a la carga de archivos DjVu o PDF est\u00e1 habilitado, permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de metacaracteres shell en (1) el par\u00e1metro page en includes/media/DjVu.php; (2) el par\u00e1metro w (tambi\u00e9n conocido como campo width) en thumb.php, lo que no se maneja correctamente por includes/media/PdfHandler_body.php; y posiblemente vectores no especificados en (3) includes/media/Bitmap.php e (4) includes/media/ImageHandler.php.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:P/I:P/A:P\",\"baseScore\":6.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.8,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.19.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7C29D44-2964-483F-B672-27B5CE471DA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"172FEFE5-9900-49D0-9E14-2FA4A7912D23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA3205F5-3A29-4D45-AC95-83174F8969BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5547DA02-3BEC-4278-A714-25CCB820AA79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3E5609D-EC04-4088-9B61-ABDD256200F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.19.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B23B09BB-8F43-4D60-A37F-D8685584AF4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.19.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A8A3F38-9A86-4346-9337-5C2A1DED37C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.19.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49CCC3B5-9BD4-40B4-AF1A-DF4B2A6DC12D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.19.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36DA1112-69AB-408A-886E-F248516FDE11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.19.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA85F3B7-9CB4-481C-B1A5-AB95F81C4126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.19.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A25C57E2-8E04-4A54-9211-C7B4B7CC4E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA12531-818E-4AD7-A3E7-467604775416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E87AB00-90DD-4548-B23A-42673DDFD1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01D8F235-2F1B-4198-A91E-B2723293AA36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A5F4A7-40E7-42D0-8482-647D0EC54AC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.22.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB117E2F-D4CD-4CED-BCEF-3C821A431F6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B461B44C-37D2-480B-9645-B7E8720416C3\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127942.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127948.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000140.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/102630\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/56695\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/57472\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.checkpoint.com/defense/advisories/public/2014/cpai-26-jan.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.checkpoint.com/threatcloud-central/articles/2014-01-28-tc-researchers-discover.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2891\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.exploit-db.com/exploits/31329/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/102631\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/65223\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1029707\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.wikimedia.org/attachment.cgi?id=14361\u0026action=diff\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.wikimedia.org/attachment.cgi?id=14384\u0026action=diff\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.wikimedia.org/show_bug.cgi?id=60339\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://gerrit.wikimedia.org/r/#/c/110069/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://gerrit.wikimedia.org/r/#/c/110069/2/includes/media/Bitmap.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://gerrit.wikimedia.org/r/#/c/110215/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127942.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127948.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000140.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/102630\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/56695\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/57472\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.checkpoint.com/defense/advisories/public/2014/cpai-26-jan.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.checkpoint.com/threatcloud-central/articles/2014-01-28-tc-researchers-discover.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2891\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.exploit-db.com/exploits/31329/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/102631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/65223\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1029707\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.wikimedia.org/attachment.cgi?id=14361\u0026action=diff\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.wikimedia.org/attachment.cgi?id=14384\u0026action=diff\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.wikimedia.org/show_bug.cgi?id=60339\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://gerrit.wikimedia.org/r/#/c/110069/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://gerrit.wikimedia.org/r/#/c/110069/2/includes/media/Bitmap.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://gerrit.wikimedia.org/r/#/c/110215/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.