CVE-2009-2492
Vulnerability from cvelistv5
Published
2009-07-17 16:00
Modified
2024-08-07 05:52
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in mt-wizard.cgi in Six Apart Movable Type before 4.261 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2009-2480.
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:52:14.767Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2009-000042",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000042.html"
          },
          {
            "name": "35885",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35885"
          },
          {
            "name": "JVN#86472161",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN86472161/index.html"
          },
          {
            "name": "35534",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35534"
          },
          {
            "name": "ADV-2009-1668",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1668"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-06-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in mt-wizard.cgi in Six Apart Movable Type before 4.261 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2009-2480."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-08-07T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "JVNDB-2009-000042",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000042.html"
        },
        {
          "name": "35885",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35885"
        },
        {
          "name": "JVN#86472161",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN86472161/index.html"
        },
        {
          "name": "35534",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35534"
        },
        {
          "name": "ADV-2009-1668",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1668"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2492",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in mt-wizard.cgi in Six Apart Movable Type before 4.261 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2009-2480."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2009-000042",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000042.html"
            },
            {
              "name": "35885",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35885"
            },
            {
              "name": "JVN#86472161",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN86472161/index.html"
            },
            {
              "name": "35534",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35534"
            },
            {
              "name": "ADV-2009-1668",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1668"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2492",
    "datePublished": "2009-07-17T16:00:00",
    "dateReserved": "2009-07-17T00:00:00",
    "dateUpdated": "2024-08-07T05:52:14.767Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-2492\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-07-17T16:30:00.983\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in mt-wizard.cgi in Six Apart Movable Type before 4.261 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2009-2480.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados en mt-wizard.cgi en Six Apart Movable Type anteriores a v4.261, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no espec\u00edficos, es una vulnerabilidad distinta a CVE-2009-2480.\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:P/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.25\",\"matchCriteriaId\":\"0641196B-87D2-40D3-B826-C04549BB6B8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:1.54:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"56106A34-006E-4B73-B6C6-3F36E9C2A355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1731B0E-71C0-4650-BFBF-1FB3865EAE76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:2.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C057E938-243B-4BEE-BF38-F3334A2B9275\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE37614D-A959-4B4A-BF2E-9F3C1072BA20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C1542C3-E6CD-4CF6-9F1D-E8E58F2A11E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47F63E3A-019C-431C-A155-1CD6E42FA485\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13132B94-C271-46F7-9450-FBA1FCBB914E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B584BED2-F630-4A5B-8FE9-29BBE9517214\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:3.36:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"14FCDA0F-2562-4B58-BF3A-F908AFABC557\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D62FC8B9-3B6A-46C6-94CD-E35941BB64C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4:*:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"414CB64F-4460-4819-A1B9-673550080C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"1841D3B7-8F8A-4FE2-B9C2-47FCFF5984AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"73406BA8-4FE0-44D0-90EF-0084881D706D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C55BC3C3-83AB-452C-AC2D-A53B3E0C3473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4.20:*:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"C4EFB50C-CC9C-46EC-92C3-A581684354E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4.20:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"E7FEAC67-FA0C-49AE-9AEB-B1E68FB54C8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart:movable_type:4.20:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"321A94B3-CDAC-4793-9660-CDCDC614EBAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart_ltd:movable_type:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F52B477-8052-432E-A382-2181BF337321\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:six_apart_ltd:movable_type:3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C580448-40D1-4C92-9301-861E4346DB65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.00:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"B1A33E50-6BFD-418F-9F3E-B42C013AA0F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.1:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"DC0F1B54-554E-45C7-8943-A73086C88385\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.2:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"A56CDA00-DC8E-4042-A882-FB6D7D2F43B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.3:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"1C8F4F3A-9942-4263-BC42-CDCDACDFF2E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.4:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"38626110-81A0-4C99-AB8F-D77FDF662887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.5:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"5212ADBE-9F50-4EAB-AC28-91314AA24595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:1.31:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"3542C36E-E457-46DD-A5F7-BD22E16F1C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.0d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"461319CC-BCDC-4E24-B384-1EEC8B7C4596\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"967DAF27-D561-4FDB-A65C-788551871E5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.01d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD460D1D-5971-491E-863A-D230A0B28ED4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BC178AF-FAF7-49E2-8AE7-1858BD67F44B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CEA1C54-4636-44B1-B620-85F0D870797E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1819A7A1-366A-4168-AE0E-4CE1FF0D3E3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F743E8-72E9-4AEB-B137-A61EB67B8FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE92182C-5BBE-4FCD-959B-E95630D16E17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99E9BE91-D42E-4523-A48E-E7B4FBE7A924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C5935CA-FDE2-4300-8091-DBD0DC4D2081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF080128-CC7C-4F71-9268-B7691D54F358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4783C1BD-B2BA-4D86-A61D-3EB2396DE1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50782308-93FA-4F8F-93FB-4A4E55D95360\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5C968A9-F07A-4C99-B4A5-434E96DDB928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:3.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9CD9174-EE47-40B8-8F49-81EAD89267D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"B4FEB07E-4D70-4A24-822E-E4689CB8C9CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"59457028-2EA4-472F-A76F-EF867F48937F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.01:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"ABE24C88-6062-4A36-9852-D9EC818EEA0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.1:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"11C793FA-AE7C-430F-B537-19B788D9BC6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.1:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"F80A607A-66A8-4995-A396-5487B8E3029C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.01:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"C3C21088-A9A5-4CE2-B4D7-8BC48DB84540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.01:b:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"C1DCAD70-9FFF-4950-875D-586937E93473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.01:b:pro:*:*:*:*:*\",\"matchCriteriaId\":\"395B9CE4-EA3A-42A1-AD37-6487911E10D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56195FCE-D933-40C6-A6A3-6AC8CFECA5DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.2:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"448081A9-A8C9-4FEC-879B-7FA11997B4D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.2:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"E7538776-B7B2-4912-BFE3-E7A1033F41E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.12:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"F33F4F69-D670-4698-84C6-EDD9D78F2D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.12:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"1E481C6C-F6EF-4E7D-8DAF-F68407DE6501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AD39A71-0B61-4319-BEE1-12CAD4B095A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.21:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"23B5D056-BC56-4851-8E76-7E22C911EEFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.21:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"CA9BC769-BE45-42EC-8E35-02E6B216D6E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.23:-:community_solution:*:*:*:*:*\",\"matchCriteriaId\":\"9A1B400B-FEC9-416B-89F2-C96B1BE11BF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.23:-:pro:*:*:*:*:*\",\"matchCriteriaId\":\"1458F0E9-6AF1-44C6-B0EC-7BCF314B0038\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN86472161/index.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000042.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/35534\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/35885\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1668\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://jvn.jp/en/jp/JVN86472161/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000042.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/35534\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/35885\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1668\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.