CVE-2011-2772 (GCVE-0-2011-2772)
Vulnerability from cvelistv5
Published
2011-11-15 02:00
Modified
2024-09-17 03:18
Severity ?
CWE
  • n/a
Summary
The get_dataroot_image_path function in lib/file.php in Mahara before 1.4.1 does not properly validate uploaded image files, which allows remote attackers to cause a denial of service (memory consumption) via a (1) large or (2) invalid image.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:30.970Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://security.debian.org/debian-security/pool/updates/main/m/mahara/mahara_1.2.6-2+squeeze3.debian.tar.gz"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://launchpad.net/mahara/+milestone/1.4.1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.launchpad.net/mahara/+bug/784978"
          },
          {
            "name": "DSA-2334",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2334"
          },
          {
            "name": "46719",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46719"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The get_dataroot_image_path function in lib/file.php in Mahara before 1.4.1 does not properly validate uploaded image files, which allows remote attackers to cause a denial of service (memory consumption) via a (1) large or (2) invalid image."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-11-15T02:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://security.debian.org/debian-security/pool/updates/main/m/mahara/mahara_1.2.6-2+squeeze3.debian.tar.gz"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://launchpad.net/mahara/+milestone/1.4.1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.launchpad.net/mahara/+bug/784978"
        },
        {
          "name": "DSA-2334",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2334"
        },
        {
          "name": "46719",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46719"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-2772",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The get_dataroot_image_path function in lib/file.php in Mahara before 1.4.1 does not properly validate uploaded image files, which allows remote attackers to cause a denial of service (memory consumption) via a (1) large or (2) invalid image."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://security.debian.org/debian-security/pool/updates/main/m/mahara/mahara_1.2.6-2+squeeze3.debian.tar.gz",
              "refsource": "CONFIRM",
              "url": "http://security.debian.org/debian-security/pool/updates/main/m/mahara/mahara_1.2.6-2+squeeze3.debian.tar.gz"
            },
            {
              "name": "https://launchpad.net/mahara/+milestone/1.4.1",
              "refsource": "CONFIRM",
              "url": "https://launchpad.net/mahara/+milestone/1.4.1"
            },
            {
              "name": "https://bugs.launchpad.net/mahara/+bug/784978",
              "refsource": "CONFIRM",
              "url": "https://bugs.launchpad.net/mahara/+bug/784978"
            },
            {
              "name": "DSA-2334",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2334"
            },
            {
              "name": "46719",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/46719"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-2772",
    "datePublished": "2011-11-15T02:00:00Z",
    "dateReserved": "2011-07-19T00:00:00Z",
    "dateUpdated": "2024-09-17T03:18:11.960Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-2772\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-11-15T03:57:56.503\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The get_dataroot_image_path function in lib/file.php in Mahara before 1.4.1 does not properly validate uploaded image files, which allows remote attackers to cause a denial of service (memory consumption) via a (1) large or (2) invalid image.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n get_dataroot_image_path en lib/file.php en Mahara anterior a v1.4.1 no valida adecuadamente la subida de imagenes, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de (1) imagen no v\u00e1lida o (2)grande.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.4.0\",\"matchCriteriaId\":\"13EA11E8-5A54-4A4B-BB70-E8F2CE243169\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:0.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D7FB07-E62A-40FE-A7BE-C809E6460585\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:0.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62BA0A1B-26BB-47B0-AA9E-5730E433675A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:0.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3362126C-F6CB-4AB8-9490-C19E43D509D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B49D797-AF1B-4F7E-A71D-AABD0F802912\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18048333-3E64-4AB4-9F20-2B1B8E7AB9FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68167317-977B-48EE-9320-2A4539A93B29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB25DF09-D88F-4633-9956-D64E3497153F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E32430EE-5F2B-4936-A297-2DF55CC22937\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC0259C-E628-4BBA-9D97-41A130B1E741\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"974F2D63-488C-41D7-A627-BF9B085A8D10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E26420D4-20D8-4D6D-88B5-C74F39B88720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"321475F4-1548-4FD1-BED9-12D944388FD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F37005DE-BB31-4738-AC49-C3C2022AE8F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FA6F03B-F449-424E-A856-5BE5FB98814F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EFDC009-9CEB-450C-8704-CA73B147F220\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FECA6B74-605D-4FCD-9DC6-EDE197862E1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"339D5D57-389C-4588-8347-61B69BB331B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E6E53AF-528E-4FCA-9A14-762015D39D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F04D0414-78B8-4110-A05D-E3D42C46607C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"199ABBC1-BBAC-41BA-B70F-7B95C99D9B0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831676A2-1A33-4605-A5F4-97FAC8A1BB18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"84652E40-1C88-438D-BCA1-4FF4C069F9AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"08F53776-5F58-4C20-8FE7-9DF06F1704A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.0:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5D55D2C-E6E5-44A4-831A-3EAE5C1568CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"79228F92-00A8-4B74-A914-11BDF9641F6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EEB3BF7-C4D3-4BB8-893F-B0FE252F0405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE91ED4-EA2A-4402-813C-1A2E5B10EA40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7FB1F02-A03F-45E5-8D26-C007C10EE97D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A09C63AC-15A8-4722-B18E-98A86EC8A856\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"62452677-EE4C-4E5E-9DD2-D11C4211DA54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FDC6F32-24C0-4B5E-8338-FF85B0BBF801\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92848F08-EBFC-4579-A088-EC15D0B3EE48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D97D8A87-390E-45AC-B1B0-CFD63C7F07E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894C07CE-BDF4-4652-9591-6DB6877582F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D278FD-9892-4B8F-BB0C-9E2323F7B9DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6537E2-0A45-4CFB-82A4-5BF25E59C8DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BBAF369-421F-4073-90D8-C67420CD4079\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB363CEB-6744-454A-88D4-D005E988ADCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6DDF54D-8919-45F2-8B23-B5B1AD2FEE85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BAF00FF-8F66-4C6A-B88B-810F2DC96A16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED69BC0A-7C5F-4914-8030-B8FD113AEA48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A62AC27-3F69-4705-8C66-CBAED72A9EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.0:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"299920CB-3F4D-44C9-B0DB-E903C9DC1EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"49753C3B-2025-497A-AF5F-30949ACD0742\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E5CFB7A-3C90-4394-BECA-7C31D06A69E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C767369-1F19-44C7-A8E8-EEA7C52DF1BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"E115E0FC-B489-4294-ACF7-59C693602AF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C9CDAB-9F01-42CE-AB1F-CC81B2D145EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"604DD0C5-7432-45AB-AA7C-F6018F2CC479\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4397E8D-502A-41B5-AE03-223616BA7A80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C25DD02-C589-4A65-A87D-73BB0392D964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FDB8082-B11B-4485-92AC-B7F9088D7E4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08A0B2A1-A3AB-4EFC-BE3D-57D38B315107\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"016E86B6-B450-499B-852C-A68803127936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C602276-C0AE-46EC-972E-0D32C31AEFA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.3.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"69B261E9-9F73-442C-A234-8E95A72BE0F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.3.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"71E57083-FAC5-4F98-AFB4-7449D38396FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.3.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DCBBD59-FB74-420C-A652-7B392A0DA468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.3.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0626B4E-1A96-4FD3-B3A9-A99B4DEC52EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.3.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B54F4801-9C4D-47CA-AE0E-022AEA212D1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E7BED57-573D-4F3E-923A-C7ECF2C7B2F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B41ED313-9CB3-4BBB-9FAF-737FFE7CBD9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0262773C-58A6-4706-B5A2-5C60EC798A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9525B6E-A870-499E-9E73-FEBB3880ADC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CF82733-11FD-41CB-9D5C-A81D891AD57D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC3515E-0923-40D8-A026-833DCAE47648\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A17F7E30-71E4-41FC-883C-9E5DBF659A9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E59B9197-F3A7-48FE-B4EB-66E77477F119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.4:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"76ADB798-ECDF-400A-812B-8DA40DE652B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.4:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"621775F5-0256-4D4E-8F75-74F116029346\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mahara:mahara:1.4:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"06BD6041-32C5-4470-A710-E8ACDD90A719\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/46719\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.debian.org/debian-security/pool/updates/main/m/mahara/mahara_1.2.6-2+squeeze3.debian.tar.gz\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2334\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugs.launchpad.net/mahara/+bug/784978\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://launchpad.net/mahara/+milestone/1.4.1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/46719\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.debian.org/debian-security/pool/updates/main/m/mahara/mahara_1.2.6-2+squeeze3.debian.tar.gz\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2334\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.launchpad.net/mahara/+bug/784978\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://launchpad.net/mahara/+milestone/1.4.1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…