ai-pentest-api / core /cve_cache.json
AI Pentest Deploy
Clean deploy: remove junk dirs, backend only
792e3b9
{
"CVE-2004-1559": {
"cached_at": "2026-04-25T01:56:53.994594+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2004-1559",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-12-31T05:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Wordpress 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) redirect_to, text, popupurl, or popuptitle parameters to wp-login.php, (2) redirect_url parameter to admin-header.php, (3) popuptitle, popupurl, content, or post_title parameters to bookmarklet.php, (4) cat_ID parameter to categories.php, (5) s parameter to edit.php, or (6) s or mode parameter to edit-comments.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=109641484723194&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/12683",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1011440",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/11268",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17532",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=109641484723194&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/12683",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1011440",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/11268",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17532",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Multiple cross-site scripting (XSS) vulnerabilities in Wordpress 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) redirect_to, text, popupurl, or popuptitle parameters to wp-login.php, (2) redirect_url parameter to admin-header.php, (3) popuptitle, popupurl, content, or post_title parameters to bookmarklet.php, (4) cat_ID parameter to categories.php, (5) s parameter to edit.php, or (6) s or mode parameter to edit-comments.php."
}
},
"CVE-2004-1584": {
"cached_at": "2026-04-25T01:56:55.232622+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2004-1584",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-12-31T05:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CRLF injection vulnerability in wp-login.php in WordPress 1.2 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the text parameter."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=109716327724041&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/12773",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://wordpress.org/development/2004/10/wp-121/",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200410-12.xml",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/11348",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17649",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=109716327724041&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/12773",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://wordpress.org/development/2004/10/wp-121/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200410-12.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/11348",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17649",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "CRLF injection vulnerability in wp-login.php in WordPress 1.2 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the text parameter."
}
},
"CVE-2005-1102": {
"cached_at": "2026-04-25T01:56:56.407668+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2005-1102",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-05-02T04:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in template-functions-post.php in WordPress 1.5 and earlier allow remote attackers to execute arbitrary commands via the (1) content or (2) title of the post."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.5",
"matchCriteriaId": "94082842-67EC-4709-A093-198B69DE582A"
}
]
}
]
}
],
"references": [
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=88926",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=111336102101571&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://security.gentoo.org/glsa/glsa-200506-04.xml",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://wordpress.org/support/topic.php?id=30721",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=88926",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://marc.info/?l=bugtraq&m=111336102101571&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://security.gentoo.org/glsa/glsa-200506-04.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://wordpress.org/support/topic.php?id=30721",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Multiple cross-site scripting (XSS) vulnerabilities in template-functions-post.php in WordPress 1.5 and earlier allow remote attackers to execute arbitrary commands via the (1) content or (2) title of the post."
}
},
"CVE-2005-1687": {
"cached_at": "2026-04-25T01:56:57.622589+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2005-1687",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-05-20T04:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in wp-trackback.php in Wordpress 1.5 and earlier allows remote attackers to execute arbitrary SQL commands via the tb_id parameter."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9"
}
]
}
]
}
],
"references": [
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=88926",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=111661517716733&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://security.gentoo.org/glsa/glsa-200506-04.xml",
"source": "cve@mitre.org"
},
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=88926",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://marc.info/?l=bugtraq&m=111661517716733&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://security.gentoo.org/glsa/glsa-200506-04.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "SQL injection vulnerability in wp-trackback.php in Wordpress 1.5 and earlier allows remote attackers to execute arbitrary SQL commands via the tb_id parameter."
}
},
"CVE-2005-1688": {
"cached_at": "2026-04-25T01:56:58.764366+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2005-1688",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-05-20T04:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-425"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-425"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.5",
"matchCriteriaId": "94082842-67EC-4709-A093-198B69DE582A"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=111661517716733&w=2",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=111661517716733&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
},
"cvss": 5.3,
"severity": "MEDIUM",
"description": "Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message."
}
},
"CVE-2005-1810": {
"cached_at": "2026-04-25T01:57:00.033066+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2005-1810",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-06-01T04:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in template-functions-category.php in WordPress 1.5.1 allows remote attackers to execute arbitrary SQL commands via the $cat_ID variable, as demonstrated using the cat parameter to index.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38085E5A-7B41-4E43-8A22-5FD44970F3EA"
}
]
}
]
}
],
"references": [
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=94512",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=111817436619067&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/15517",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200506-04.xml",
"source": "cve@mitre.org"
},
{
"url": "http://wordpress.org/development/2005/05/security-update/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.osvdb.org/16905",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/13809",
"source": "cve@mitre.org"
},
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=94512",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://marc.info/?l=bugtraq&m=111817436619067&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/15517",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200506-04.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://wordpress.org/development/2005/05/security-update/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.osvdb.org/16905",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/13809",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "SQL injection vulnerability in template-functions-category.php in WordPress 1.5.1 allows remote attackers to execute arbitrary SQL commands via the $cat_ID variable, as demonstrated using the cat parameter to index.php."
}
},
"CVE-2005-1921": {
"cached_at": "2026-03-25T11:57:45.045069+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2005-1921",
"sourceIdentifier": "secalert@redhat.com",
"published": "2005-07-05T04:00:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:xml_rpc:*:*:*:*:*:pear:*:*",
"versionEndIncluding": "1.3.0",
"matchCriteriaId": "DF9FF982-2BF4-49ED-82F8-C8F8327D2EF3"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gggeek:phpxmlrpc:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.1",
"matchCriteriaId": "83956BC5-8694-4C4B-92C4-D3C960980F66"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.5.4",
"matchCriteriaId": "00201099-3C07-44F0-880B-CE2AE77EE171"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.6.0",
"versionEndExcluding": "4.6.2",
"matchCriteriaId": "3C248ACE-86AF-40FF-8B8F-FE1879E54FF2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.5",
"matchCriteriaId": "363E6E27-87B4-4271-B374-B176DE9E5D56"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=112008638320145&w=2",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=112015336720867&w=2",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=112605112027335&w=2",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://pear.php.net/package/XML_RPC/download/1.3.1",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Product"
]
},
{
"url": "http://secunia.com/advisories/15810",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15852",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15855",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15861",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15872",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15883",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15884",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15895",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15903",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15904",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15916",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15917",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15922",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15944",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15947",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15957",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/16001",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/16339",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/16693",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17440",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17674",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/18003",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200507-01.xml",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200507-06.xml",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200507-07.xml",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1015336",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://sourceforge.net/project/showfiles.php?group_id=87163",
"source": "secalert@redhat.com",
"tags": [
"Product"
]
},
{
"url": "http://sourceforge.net/project/shownotes.php?release_id=338803",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.ampache.org/announce/3_3_1_2.php",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-745",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-746",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-747",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-789",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.gulftech.org/?node=research&article_id=00087-07012005",
"source": "secalert@redhat.com",
"tags": [
"Not Applicable",
"Vendor Advisory"
]
},
{
"url": "http://www.hardened-php.net/advisory-022005.php",
"source": "secalert@redhat.com",
"tags": [
"Not Applicable"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:109",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory",
"Vendor Advisory"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2005_41_php_pear.html",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2005_49_php.html",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-564.html",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/419064/100/0/threaded",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/14088",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2005/2827",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=112008638320145&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=112015336720867&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=112605112027335&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://pear.php.net/package/XML_RPC/download/1.3.1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Product"
]
},
{
"url": "http://secunia.com/advisories/15810",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15852",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15855",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15861",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15872",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15883",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15884",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15895",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15903",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15904",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15916",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15917",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15922",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15944",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15947",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/15957",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/16001",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/16339",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/16693",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17440",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17674",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/18003",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200507-01.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200507-06.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200507-07.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1015336",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://sourceforge.net/project/showfiles.php?group_id=87163",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "http://sourceforge.net/project/shownotes.php?release_id=338803",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.ampache.org/announce/3_3_1_2.php",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-745",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-746",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-747",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-789",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.gulftech.org/?node=research&article_id=00087-07012005",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Vendor Advisory"
]
},
{
"url": "http://www.hardened-php.net/advisory-022005.php",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:109",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory",
"Vendor Advisory"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2005_41_php_pear.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2005_49_php.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-564.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/419064/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/14088",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2005/2827",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement."
}
},
"CVE-2005-2107": {
"cached_at": "2026-04-25T01:57:01.312165+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2005-2107",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-07-05T04:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in post.php in WordPress 1.5.1.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) p or (2) comment parameter."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7D86BA1-3DC8-478C-B2FA-581F9AE1F93E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E7BEFBD-4326-44A5-A160-9406D94AB307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E85A88D7-07A1-4A8C-88B5-057AD9C675E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38085E5A-7B41-4E43-8A22-5FD44970F3EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7F0BF1F6-A54A-48E8-A872-015FE10E5D03"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=112006967221438&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/15831",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.gulftech.org/?node=research&article_id=00085-06282005",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=112006967221438&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/15831",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.gulftech.org/?node=research&article_id=00085-06282005",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Multiple cross-site scripting (XSS) vulnerabilities in post.php in WordPress 1.5.1.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) p or (2) comment parameter."
}
},
"CVE-2005-2108": {
"cached_at": "2026-04-25T01:57:02.995392+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2005-2108",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-07-05T04:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in XMLRPC server in WordPress 1.5.1.2 and earlier allows remote attackers to execute arbitrary SQL commands via input that is not filtered in the HTTP_RAW_POST_DATA variable, which stores the data in an XML file."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7D86BA1-3DC8-478C-B2FA-581F9AE1F93E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E7BEFBD-4326-44A5-A160-9406D94AB307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E85A88D7-07A1-4A8C-88B5-057AD9C675E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38085E5A-7B41-4E43-8A22-5FD44970F3EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7F0BF1F6-A54A-48E8-A872-015FE10E5D03"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=112006967221438&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/15831",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.gulftech.org/?node=research&article_id=00085-06282005",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=112006967221438&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/15831",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.gulftech.org/?node=research&article_id=00085-06282005",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "SQL injection vulnerability in XMLRPC server in WordPress 1.5.1.2 and earlier allows remote attackers to execute arbitrary SQL commands via input that is not filtered in the HTTP_RAW_POST_DATA variable, which stores the data in an XML file."
}
},
"CVE-2005-2109": {
"cached_at": "2026-04-25T01:57:04.197637+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2005-2109",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-07-05T04:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "wp-login.php in WordPress 1.5.1.2 and earlier allows remote attackers to change the content of the forgotten password e-mail message via the message variable, which is not initialized before use."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7D86BA1-3DC8-478C-B2FA-581F9AE1F93E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E7BEFBD-4326-44A5-A160-9406D94AB307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E85A88D7-07A1-4A8C-88B5-057AD9C675E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38085E5A-7B41-4E43-8A22-5FD44970F3EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7F0BF1F6-A54A-48E8-A872-015FE10E5D03"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=112006967221438&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/15831",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.gulftech.org/?node=research&article_id=00085-06282005",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=112006967221438&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/15831",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.gulftech.org/?node=research&article_id=00085-06282005",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "wp-login.php in WordPress 1.5.1.2 and earlier allows remote attackers to change the content of the forgotten password e-mail message via the message variable, which is not initialized before use."
}
},
"CVE-2009-2629": {
"cached_at": "2026-04-25T01:57:06.780786+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2009-2629",
"sourceIdentifier": "cret@cert.org",
"published": "2009-09-15T22:30:00.233",
"lastModified": "2026-04-23T00:35:47.467",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer inferior en src/http/ngx_http_parse.c en nginx v0.1.0 a la v0.5.37, v0.6.x a la v0.6.39, v0.7.x a la v0.7.62, y v0.8.x anterior a v0.8.15, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de peticiones HTTP manipuladas."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.1.0",
"versionEndExcluding": "0.5.38",
"matchCriteriaId": "F0DE2A3E-F210-4B55-900A-13C309891E3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.6.0",
"versionEndExcluding": "0.6.39",
"matchCriteriaId": "692B1E17-4FB8-484E-85D2-4E90641268F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.7.0",
"versionEndExcluding": "0.7.62",
"matchCriteriaId": "587F3642-4CB9-4D61-A5C9-55D7D172D96D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.8.0",
"versionEndExcluding": "0.8.15",
"matchCriteriaId": "93F18982-44F0-4A93-9A6A-D857E1577A5B"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*",
"matchCriteriaId": "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*",
"matchCriteriaId": "B3BB5EDB-520B-4DEF-B06E-65CA13152824"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*",
"matchCriteriaId": "E44669D7-6C1E-4844-B78A-73E253A7CC17"
}
]
}
]
}
],
"references": [
{
"url": "http://nginx.net/CHANGES",
"source": "cret@cert.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "http://nginx.net/CHANGES-0.5",
"source": "cret@cert.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "http://nginx.net/CHANGES-0.6",
"source": "cret@cert.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "http://nginx.net/CHANGES-0.7",
"source": "cret@cert.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "http://sysoev.ru/nginx/patch.180065.txt",
"source": "cret@cert.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2009/dsa-1884",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/180065",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://nginx.net/CHANGES",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "http://nginx.net/CHANGES-0.5",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "http://nginx.net/CHANGES-0.6",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "http://nginx.net/CHANGES-0.7",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "http://sysoev.ru/nginx/patch.180065.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2009/dsa-1884",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/180065",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests."
}
},
"CVE-2009-3896": {
"cached_at": "2026-04-25T01:57:08.125199+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2009-3896",
"sourceIdentifier": "secalert@redhat.com",
"published": "2009-11-24T17:30:00.377",
"lastModified": "2026-04-23T00:35:47.467",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI."
},
{
"lang": "es",
"value": "src/http/ngx_http_parse.c en nginx (como Engine X) v0.1.0 hasta v0.4.14, v0.5.x anterior v0.5.38, v0.6.x anterior v0.6.39, v0.7.x anterior v0.7.62, y v0.8.x anterior 0.8.14 permite a atacantes remotos causar una denegaci\u00f3n de servicio (deferencia puntero nulo y ca\u00edda de proceso) a trav\u00e9s de una URI larga."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "34E64473-58DC-4158-BB07-071A670CDC49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC9B36B-CC2F-442F-AEF6-F911AFEE966A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "44AE0F17-F320-40FA-AD43-E4C22FE3B455"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3CF8D9C0-99DE-4EB9-8EE1-C4EBBDF8F060"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E53B582A-8EE0-4FE0-8B86-6068E8F28F72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D6139614-6835-4295-9D1F-1686D28C2D18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DF8FD201-BCEF-409C-8442-B15727893F23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3130F07A-9524-4DF0-83F8-32E13341E0AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BC716174-E211-4497-8AD6-49AC6CB2776A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5F06259F-0848-428E-A9C3-9A96C4018EBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1DABF871-39BB-4DAC-B4FA-EF2C96CF3D9A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "012FF2E6-D51D-4233-B961-F4E0EDC5A83F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "AA0B3776-F86D-40CB-8372-722B49F44672"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "8C434DCD-B225-4BB5-B3A1-50C4338967BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "20DA7234-6824-49D4-85D5-90C10950A884"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "FE5D29F6-18F4-41DE-A4FC-1F4387622C40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9A21A021-2231-4639-973F-B626869127C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "581C97AC-A2A2-4C00-821A-223FE795E1AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "EE3669C7-BDB1-4D3A-97A2-B32F8169E160"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "B95F8086-EBA4-447C-8D5B-57AB1BDB7C86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "BD5AB833-DF18-4D5A-8C83-D8CDDE09DCF4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "D73F74AD-C174-46E0-8F15-63E1D24522A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "04E8B6C4-7D39-464D-ACF0-4C8B0E1BA4F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "762CB3D2-FDBD-4C15-A6FB-9C571E54CB4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "A8187A09-E624-494E-9D0B-4915227CD0C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "CFFD2EC6-7600-4A14-901E-A09872FA34E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "71A4BEE0-0AE1-4F0B-BE6B-94DEAA4AC4ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.27:*:*:*:*:*:*:*",
"matchCriteriaId": "C1AA69A1-E4A0-4541-9683-C7926876EC15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.28:*:*:*:*:*:*:*",
"matchCriteriaId": "A081CD0C-583C-4702-80A7-5EB83F1F2222"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.29:*:*:*:*:*:*:*",
"matchCriteriaId": "BB538A03-5C14-416C-ABC8-3CF6F40AC74D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7CE79D-2141-4786-8F5A-75475A997A26"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "BC95E17A-13E0-418D-BAB3-5DE38B64BCAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "B511DE8A-03C1-45CC-BFAD-5CBAD08051D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.33:*:*:*:*:*:*:*",
"matchCriteriaId": "A36CF460-5D9E-4F92-A5FB-67B2CF6F9C5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.34:*:*:*:*:*:*:*",
"matchCriteriaId": "369C67DE-3FC6-4789-96E4-A56DDF24674E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.35:*:*:*:*:*:*:*",
"matchCriteriaId": "24FF9759-62E5-4E80-A8E8-B01FAAB75BA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.36:*:*:*:*:*:*:*",
"matchCriteriaId": "BB185CAF-795D-4945-B0D6-568936D0A102"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.37:*:*:*:*:*:*:*",
"matchCriteriaId": "6EDF43E1-7334-44B1-9BDD-EE543AFA239C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.38:*:*:*:*:*:*:*",
"matchCriteriaId": "B03BF1D6-A0BF-42DA-8319-C4CF551F909D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.39:*:*:*:*:*:*:*",
"matchCriteriaId": "D5E34697-5F0B-4189-8E02-DF310DB2B11D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "03071B0A-666F-46FC-B1EF-6498384D446C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "D88341D2-BF1E-40BD-B3EB-EB5D7C80CBE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.42:*:*:*:*:*:*:*",
"matchCriteriaId": "11B039BA-92B2-48EC-A419-31C0C429C339"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "AC1AF8B0-9A94-4EBF-B164-9EE4298D0FCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "58F7209C-A5A1-4F2D-91C4-A130F46ABC88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.45:*:*:*:*:*:*:*",
"matchCriteriaId": "F2604E43-1C77-42DD-B396-5A25B0A39850"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "26139CB0-8BAD-4BF2-8BAC-1B228B5F561F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CA4F8E-D458-4DC8-97BA-9F7ADC85429D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F062FD01-831F-46B4-9C7A-492B5F5A525B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "93021C52-5F88-450E-A0FA-1E7AD4BF4A6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F47DF42F-EBA9-4E75-933C-53A0CE9691C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "72C527B7-EEDA-4013-BCEA-AEA5F5A889C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8868A8E3-4299-4796-8A96-EC402E3998F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93E7B28C-9D1A-49B5-8A54-9555B08471C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F6D6360-9C6C-4CE5-82F2-8BE2AF41A4E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF59F965-59C2-4759-A4FF-D828CF515812"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "62E97F69-C178-4F7F-8472-6147DF22E69E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FCD01A-6B3E-4B29-AAB2-A3EFB3965B27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "372E2B59-085D-4E64-9F77-BEDE0FAFE3F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FDCC283B-FF74-47F3-AAEC-3A99110290C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "58286494-21A9-4AC7-B9A7-58D2B9860374"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BF99C635-748F-49A8-940B-5AB48213D6F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C1AA5F7E-F36E-4FF4-B9BF-D307D7F8408D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "163AE467-E1C1-48D4-B2FA-9F28D99D8CD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2055FAFE-54CA-4E45-8818-E27D77BD25D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F3DD8251-9808-48F0-8ED2-04189BAC83E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2B394B65-D904-4D26-BEF7-55CD151D0830"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "F98696CC-3329-4A16-BEF0-ABB1171CA263"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "B37C15B1-7752-45AA-89AE-C770AFA032B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "62AECD27-1854-4E6C-8CFB-47B7C71AC70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "3DB0F596-17BF-4324-9E2E-9A3D5AC3E533"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "6DBE5715-7673-4620-81EA-972A5CA7DEE7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "1589B6E4-6647-40F6-B34F-4064A068E3ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.20:*:*:*:*:*:*:*",
"matchCriteriaId": "DE8DF630-0EEF-4D69-BAE0-F433D2682D50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.21:*:*:*:*:*:*:*",
"matchCriteriaId": "5E844090-43AA-4846-9850-15573DA320DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.22:*:*:*:*:*:*:*",
"matchCriteriaId": "75E1BB11-1D9F-43E3-A215-BC8FFE3B2912"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.23:*:*:*:*:*:*:*",
"matchCriteriaId": "0040B3E4-A2CC-45CF-B2E2-B03C56344CE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.24:*:*:*:*:*:*:*",
"matchCriteriaId": "D46650F1-CCBC-42BD-9D6E-D07A6EC7A58A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.25:*:*:*:*:*:*:*",
"matchCriteriaId": "F33D99A0-5AC9-445B-8C68-204B1E2A1B42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.26:*:*:*:*:*:*:*",
"matchCriteriaId": "52D78B06-0826-44E4-AB0C-61C77BEB0598"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.27:*:*:*:*:*:*:*",
"matchCriteriaId": "8F98F843-0D15-4455-900B-20719D285B56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.28:*:*:*:*:*:*:*",
"matchCriteriaId": "DBE32950-F476-446F-BFC4-EC5120D6CE61"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.29:*:*:*:*:*:*:*",
"matchCriteriaId": "3E3E1C4A-2CFC-43A0-B246-5199B41A7C29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.30:*:*:*:*:*:*:*",
"matchCriteriaId": "B9C85B18-40E5-42F0-886C-19FABD5D397B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.31:*:*:*:*:*:*:*",
"matchCriteriaId": "46C8CD08-073E-4611-B2D1-66C0BB5B00F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.32:*:*:*:*:*:*:*",
"matchCriteriaId": "C4EF6E8E-4E8D-4BAD-ACB0-FB38CD048A65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.33:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BEE011-B625-4227-8A24-92A4BDAF6F32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.34:*:*:*:*:*:*:*",
"matchCriteriaId": "1F952AF9-7917-4FE6-AA61-79410453FBF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.35:*:*:*:*:*:*:*",
"matchCriteriaId": "D54B2662-A8E6-4754-BDE4-640FB9A8F979"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.36:*:*:*:*:*:*:*",
"matchCriteriaId": "0964C0F0-BFB6-47F4-BC8B-ACC772FA82CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.37:*:*:*:*:*:*:*",
"matchCriteriaId": "DD44DA86-3AC7-490C-B690-44F1CAC94BD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.38:*:*:*:*:*:*:*",
"matchCriteriaId": "A94073D1-E657-4E92-985A-00427E17A485"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.39:*:*:*:*:*:*:*",
"matchCriteriaId": "89988EAE-D4E8-49D6-98E8-246A7D98D4BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.40:*:*:*:*:*:*:*",
"matchCriteriaId": "6496AFD5-3232-4BA8-8404-D5E286B6BCE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.41:*:*:*:*:*:*:*",
"matchCriteriaId": "E68A4F70-1335-427F-8916-90B5F25E786F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC479CA-500E-4A45-8435-D5E55DD4D281"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.43:*:*:*:*:*:*:*",
"matchCriteriaId": "F15289EE-16F1-4B71-89BD-36A03607326B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.44:*:*:*:*:*:*:*",
"matchCriteriaId": "67BAF1E6-913A-4856-80BF-4A39863E8DB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.45:*:*:*:*:*:*:*",
"matchCriteriaId": "81294D2E-D087-40EF-96B8-2D6C5D33F09C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.46:*:*:*:*:*:*:*",
"matchCriteriaId": "1774A68D-33A8-4DBD-ADF1-143FBE7BBBB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.47:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8BEBBC-44CD-4994-BCB4-AB90C1FE4315"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.48:*:*:*:*:*:*:*",
"matchCriteriaId": "EBE5CC5C-8E80-483F-876E-6D4A6FE0E9A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.49:*:*:*:*:*:*:*",
"matchCriteriaId": "AA4CB751-91CE-4FAD-A54B-FEA780AF094E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.50:*:*:*:*:*:*:*",
"matchCriteriaId": "BED74A8F-C022-469F-8F6C-25C8C9D2696E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "136D17BD-CC63-4427-A139-C9FA72D6D42B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.52:*:*:*:*:*:*:*",
"matchCriteriaId": "94C19287-D201-40CA-B6E4-F89DE786F967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.53:*:*:*:*:*:*:*",
"matchCriteriaId": "6938773B-2874-48E1-866B-2E9286BFCB7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.54:*:*:*:*:*:*:*",
"matchCriteriaId": "704C5C74-2154-4DB8-AFE4-8A9FCA8B75C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.55:*:*:*:*:*:*:*",
"matchCriteriaId": "8DEEACA6-935B-432D-AE61-E7C6A0383EBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.56:*:*:*:*:*:*:*",
"matchCriteriaId": "166361C6-183D-487E-A423-7A24CE0397F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.57:*:*:*:*:*:*:*",
"matchCriteriaId": "48678CF2-0C88-440B-AA49-C705A72C75D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.58:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB80FD7-FC22-4911-89D4-95A502FABE03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.59:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFE1CA3-993C-4E9A-880A-AE2581390BF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.60:*:*:*:*:*:*:*",
"matchCriteriaId": "B3359813-9345-4F3A-8F29-BDAB8A42A971"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.61:*:*:*:*:*:*:*",
"matchCriteriaId": "FCDE4A4D-FB19-4BAC-B2C9-E07C5F5705C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "565C6100-5502-49A6-8F17-53921FC243C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB82464D-E387-4844-9021-FF7195F905B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "69A6688A-DF98-4433-91CC-FE6FDEC3968A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1DD81AF6-B55B-47A7-8F29-C135F33FA7D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0C0CA98A-C99A-4021-BF38-4FB5184D0E93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F962CE1E-218F-4FBE-A4ED-922988D3BA91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EEC5AB3B-32FA-4AD5-8E31-573D4DCABBF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8388B1-8C01-49DD-BF3C-3C3B0FEA1F56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C625397F-DF52-4ED9-90AE-7CBCE56AECE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1582E4C7-83A0-45E5-B7E1-CDB22BDB17B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2EDF7DB8-C9C0-47E4-85AF-D195BFCE426E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "97532F9D-CED0-466A-9E65-276E68972897"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "373A5785-1113-425F-9E7F-DF58E0DFF3E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F713F0D0-0E1B-45A3-90C3-AB9ED5666A65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC4C3A9-324E-4006-B0C9-966C144A02EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB7BA5F-AF0A-4282-AABA-F57C3BC425FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8B8800DB-A500-47FA-AD71-F3012D9E6C38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E7D68735-877D-4A5A-BCE4-9204C06A877C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B994025A-5AA0-4ACB-B830-AD84578EE935"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E612C3BE-89AB-47FC-9B65-11EC3FA53A20"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B6137B44-F31E-49EF-8249-68C7B19DBF6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AADCADD7-2EEE-4397-B737-4FD071694C0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8C3EC4EA-722D-4767-B271-E5E94A61B2A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C7BD35FB-0406-45A4-983F-23FCB9AD8EA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "845EAF67-F86C-47FF-AD63-424FC5FE3344"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "99ED4116-D874-463C-8A62-56297CFF02D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "72C6A905-8CF0-44F4-B67C-7D55D22BFD9F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9A5DE1-9728-4E9B-AA3A-FFFDB90A4D17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "079D51E9-82F2-4ECF-8711-42A1E8BF3AFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "473D1711-E4A2-4979-AA10-B3439036D8C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "E056E5DB-C16C-461F-885E-B516A3C3C880"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "94ACFB0D-7EF1-4E83-8A75-EB843398F7AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1D3DCD04-DD8B-4B8E-A9B2-0999C8D6F088"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "BBFFF0B8-F20D-4197-A3F9-8CAAC784E4A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "365BC524-97F9-47AD-8ECD-0FF60B55BD12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.21:*:*:*:*:*:*:*",
"matchCriteriaId": "745F4FAC-AD36-469C-B54D-F695146F9FFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.22:*:*:*:*:*:*:*",
"matchCriteriaId": "EB8B6F37-4CE1-4DEF-BDE9-EC9BA422F543"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.23:*:*:*:*:*:*:*",
"matchCriteriaId": "E82535AE-E45A-45EE-8303-4F8EC461F4C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.24:*:*:*:*:*:*:*",
"matchCriteriaId": "9526A9D2-05DB-4DD2-BE87-0FEA6A9E52E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.25:*:*:*:*:*:*:*",
"matchCriteriaId": "C72B94DF-B4C1-40F7-A3FD-5EEE64119816"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.26:*:*:*:*:*:*:*",
"matchCriteriaId": "C642F33D-3A9E-4576-B831-556AA4902ED8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.27:*:*:*:*:*:*:*",
"matchCriteriaId": "0E69078D-579F-48AD-8BC7-2EEA06DCA02A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.28:*:*:*:*:*:*:*",
"matchCriteriaId": "535E9578-88F5-430E-8DBA-0E324C1362BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.29:*:*:*:*:*:*:*",
"matchCriteriaId": "B5022F10-D091-4D53-8476-53DBDC304B8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.30:*:*:*:*:*:*:*",
"matchCriteriaId": "7E1CE05D-A611-4854-8BC4-C58C2F4723FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.31:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD5BD39-95EF-4157-9CFC-A69FD782051F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.32:*:*:*:*:*:*:*",
"matchCriteriaId": "16CF4D49-A36D-40BF-B198-CBA04A4BC55A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.33:*:*:*:*:*:*:*",
"matchCriteriaId": "6E621C1A-2A94-477C-A22C-2512028F46AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.34:*:*:*:*:*:*:*",
"matchCriteriaId": "4A5F41CC-69EA-4C49-8E59-9D352F760E3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.35:*:*:*:*:*:*:*",
"matchCriteriaId": "D77FF714-F370-484C-BA9F-48C3897D95D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.36:*:*:*:*:*:*:*",
"matchCriteriaId": "0977CC72-8588-4148-BBB3-8B2811040467"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.37:*:*:*:*:*:*:*",
"matchCriteriaId": "2058F887-2DE6-4837-B758-16D4D31AE625"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0D4AEFBC-4141-4B17-8449-6796B27718A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4773F9A8-5E43-4DBB-8BC9-7A3FF07AA54D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "873B5C88-11A9-4F77-BBD1-F468067B83BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0E6E2758-B282-4AB6-861C-5909AC811ECF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F21C4FD5-B9B4-4D88-A158-2BB1A92C5C2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B0B12A7-8D8E-4D75-A3E6-CE92C0F124D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "72914EBD-C4F4-4BCD-9613-583CB98562A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "93BD0D22-9EB6-40E0-AE14-EFC79C249454"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "782E7ED3-06BF-42C6-A2CF-29C4962C328C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "97D0B1F9-CE07-4A87-8512-BCAD25B7DA86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3DAC5268-E39F-4D92-ADAC-05FBBF60E929"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "45490E90-DD0F-4DC6-95C9-79420726B6BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "2A9F1EC1-1610-43B9-8A72-2CC0DE6D5B82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "265CB602-4C78-497C-8E5C-758AC764D1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "97CD6E57-3B28-406E-97B7-00B516E209F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "71B7EE8C-2C13-4F5C-8E78-57B48B872193"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A58D8933-5E4C-452F-95DF-B52DF9597A30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "E309D12E-2635-4DC7-B63E-AC8120402031"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.19:*:*:*:*:*:*:*",
"matchCriteriaId": "CD498ABB-A75A-4C0A-A038-CE98C60A1E67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.20:*:*:*:*:*:*:*",
"matchCriteriaId": "B7FD994B-C52A-43E9-BDCF-C4DA80A56ED6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2D7132AC-0824-474B-A1EA-1E7A8FA5692A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.22:*:*:*:*:*:*:*",
"matchCriteriaId": "5FE4DE37-F9CD-41AD-80D8-EA8FE4FDC4F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.23:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD802A9-6934-40A2-9EE5-E30A86BAF58B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.24:*:*:*:*:*:*:*",
"matchCriteriaId": "38DAA70B-2E2F-4A99-AF7A-690C8A819F12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.25:*:*:*:*:*:*:*",
"matchCriteriaId": "1413E07A-A8AD-40E4-8E53-F031DF8D8C5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.26:*:*:*:*:*:*:*",
"matchCriteriaId": "6FECFF93-AAA7-4F75-A7F8-957505A399C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.27:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C141D8-018B-4894-9D2A-3DDF13A27144"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.28:*:*:*:*:*:*:*",
"matchCriteriaId": "EB96A11F-9BD6-4A5D-99B8-B9269D853AE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.29:*:*:*:*:*:*:*",
"matchCriteriaId": "938A7EF3-E292-4CC2-B6CF-3CCCC4E5C892"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.30:*:*:*:*:*:*:*",
"matchCriteriaId": "1502DF53-1944-4352-87E6-1CDD333112BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.31:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6D10FB-7099-41CE-8D81-F133D2968D77"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.32:*:*:*:*:*:*:*",
"matchCriteriaId": "55743854-1678-40C1-917D-FD4711DAFD97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.33:*:*:*:*:*:*:*",
"matchCriteriaId": "B05BE618-3054-42F0-932E-35D711D9E959"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.34:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD3717C-6049-4FF5-A3AC-53A262C93447"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.35:*:*:*:*:*:*:*",
"matchCriteriaId": "1E6BE57C-901A-4B7D-84F3-AFC79118949D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.36:*:*:*:*:*:*:*",
"matchCriteriaId": "4FD98F9B-9A77-44F2-8CBE-5EE53E2CB2D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.37:*:*:*:*:*:*:*",
"matchCriteriaId": "D8FE0346-1D52-4AAF-8593-859FC85AC520"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.38:*:*:*:*:*:*:*",
"matchCriteriaId": "00E4C8C0-02C4-45A3-BFB4-3795318D7EFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8BE564-9784-46A4-9712-6BE812B757E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "09EB5ECD-D851-4FD1-838E-01CD779C4707"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "872B3995-3D72-4BBE-B8C5-E2142390B394"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AA55740C-C77E-4B75-B7A2-8950E0673DED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D2B423AB-4283-47F6-BA44-FD76E4FA2558"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C51C9E-C83C-4E86-B91B-A6001CDC3D78"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D80F4C49-8CD5-4EB9-9346-12EE143004F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "94DE340D-782B-42B2-8EDF-DD8584C52703"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F137967D-9A3A-44B8-8E41-56D42AC9FBFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "9E47C74C-697B-48C1-A20E-E30B1EB115AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2B8B0F-C5E9-4DDE-A303-24E63B5C486A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A9FE0645-873B-48E1-8D67-B6E9CE41EE76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A2136748-7ADD-48FE-85C7-C7FDF3DFC7B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E4738D-5A55-4142-BF7D-C5FBE6AD92C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.14:*:*:*:*:*:*:*",
"matchCriteriaId": "2F41A657-FB84-40A4-A812-4A940C19C563"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.15:*:*:*:*:*:*:*",
"matchCriteriaId": "6128BCAB-B6C1-45EA-90EB-D341A0BBBCDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.16:*:*:*:*:*:*:*",
"matchCriteriaId": "40921150-A75E-44DB-947D-948BB6FD95FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.17:*:*:*:*:*:*:*",
"matchCriteriaId": "3B5A48B6-3F34-4C36-AB4F-389F8C6F99A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.18:*:*:*:*:*:*:*",
"matchCriteriaId": "41C8D846-A1E8-4CF9-9D51-37A80BA1DDBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.19:*:*:*:*:*:*:*",
"matchCriteriaId": "4A755328-5783-4F2C-A831-4AF52A263984"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.20:*:*:*:*:*:*:*",
"matchCriteriaId": "6027BA55-6D4E-44AD-B1E2-9BC7E219DD00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.21:*:*:*:*:*:*:*",
"matchCriteriaId": "DE76724B-F1B6-4DF6-97A6-9A5C9A7539BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.22:*:*:*:*:*:*:*",
"matchCriteriaId": "7E2D3916-7C5A-4253-B7DB-CA4A17658439"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.23:*:*:*:*:*:*:*",
"matchCriteriaId": "00D9F246-2B22-453B-9078-5A9E44C000C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.24:*:*:*:*:*:*:*",
"matchCriteriaId": "1E558BFF-F580-4D06-92C3-C0799890A6BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.25:*:*:*:*:*:*:*",
"matchCriteriaId": "8771DE53-EEB6-4846-82C0-E97A23F9FC7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.26:*:*:*:*:*:*:*",
"matchCriteriaId": "6496DB0E-3A64-4006-A07F-4031117900CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.27:*:*:*:*:*:*:*",
"matchCriteriaId": "7241B5EB-341D-4788-82D5-AE88BC19B0D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.28:*:*:*:*:*:*:*",
"matchCriteriaId": "9432C71C-B324-4A8A-A2C7-6295DD06A979"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.29:*:*:*:*:*:*:*",
"matchCriteriaId": "6D80AEDB-523A-4C07-B34D-969B43995A4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.30:*:*:*:*:*:*:*",
"matchCriteriaId": "96DB2832-B421-47CC-B5BF-3264722D1F58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.31:*:*:*:*:*:*:*",
"matchCriteriaId": "CD8292E6-E9E9-4A5C-ABB5-21B30B793BAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.32:*:*:*:*:*:*:*",
"matchCriteriaId": "D74E1F34-F3B9-49B4-886C-3EACB4A39181"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.33:*:*:*:*:*:*:*",
"matchCriteriaId": "0399B66B-4C3C-46A8-BB4A-228AE7825F83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.34:*:*:*:*:*:*:*",
"matchCriteriaId": "0B64AC40-DFFD-4892-8ECC-809C62D57B23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.35:*:*:*:*:*:*:*",
"matchCriteriaId": "409B886B-1C92-4A92-ABBE-258FD13D6EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.36:*:*:*:*:*:*:*",
"matchCriteriaId": "B97D7354-FEA3-489D-93DB-29F3BDAFCFCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.37:*:*:*:*:*:*:*",
"matchCriteriaId": "AC1FE7B7-EE24-4C52-B6F7-7D8DC7436BD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.38:*:*:*:*:*:*:*",
"matchCriteriaId": "784FC15D-C0A9-4921-9FE0-13D68113979B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.39:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B49550-58F4-4E17-AA7F-C6E68381D6F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.40:*:*:*:*:*:*:*",
"matchCriteriaId": "199C31D9-564B-4DCE-90F8-DCC5185B157D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.41:*:*:*:*:*:*:*",
"matchCriteriaId": "1A0D6DF2-7295-4048-9357-598DF38B1D07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.42:*:*:*:*:*:*:*",
"matchCriteriaId": "70D35BED-F2B4-47C7-8A5B-CB2A7FFBFFAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.43:*:*:*:*:*:*:*",
"matchCriteriaId": "34446D8A-05E3-4CBC-88AE-94D1ED9B42CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.44:*:*:*:*:*:*:*",
"matchCriteriaId": "37BEDAAF-8818-47A2-B6F7-D8D69000A1D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.45:*:*:*:*:*:*:*",
"matchCriteriaId": "5CC7F6E8-87FE-4502-BE4C-733BCFD6E7BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.46:*:*:*:*:*:*:*",
"matchCriteriaId": "48DDBA8F-1676-4D23-BF0C-8858A95FF43B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.47:*:*:*:*:*:*:*",
"matchCriteriaId": "AA06F94F-B5E2-44B1-A313-256118FC0F1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.48:*:*:*:*:*:*:*",
"matchCriteriaId": "E3991D34-1D58-421A-87A8-DBBC225E64DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.49:*:*:*:*:*:*:*",
"matchCriteriaId": "574572C4-5359-48A4-BC48-8A740929601E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.50:*:*:*:*:*:*:*",
"matchCriteriaId": "B250BCDB-01E9-47BE-BF2A-42253083DF84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.51:*:*:*:*:*:*:*",
"matchCriteriaId": "69B7BD47-4AE6-4A8B-8773-97D4E47AA8EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.52:*:*:*:*:*:*:*",
"matchCriteriaId": "14412552-C2D6-4E24-8A5A-258DCFA1FD19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.53:*:*:*:*:*:*:*",
"matchCriteriaId": "54C84DD5-73DB-40E3-A930-8467CE5391C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.54:*:*:*:*:*:*:*",
"matchCriteriaId": "86840620-5641-49F2-8803-197C1E1D42A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.55:*:*:*:*:*:*:*",
"matchCriteriaId": "CDB2D731-F2CA-43FF-A170-BD3BA89C4F88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.56:*:*:*:*:*:*:*",
"matchCriteriaId": "839AA5EB-FF21-44ED-A340-5B1BC444E649"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.57:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B48748-5B9C-4D77-BE1F-9C7A436ECA5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.58:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D4C93E-8A58-4B8D-A2F9-79A1D3526FDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.59:*:*:*:*:*:*:*",
"matchCriteriaId": "0750BECB-3AB8-4A80-8D4D-F0CBA11F3E37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.60:*:*:*:*:*:*:*",
"matchCriteriaId": "E9231C67-A182-441C-9148-BB1CDE6AFF55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.61:*:*:*:*:*:*:*",
"matchCriteriaId": "3091F4CB-D14A-4BCA-8155-119AE7716360"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20A0F5C4-7FCE-4666-9B14-D0B1D4CDF23F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2192AF4D-7BEF-4A16-B8BE-86256006759D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC06391-07A4-4CC5-BE4E-9AB47956D1C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9617C1F3-52F5-4830-9477-91E8853A1A15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3396AE2A-9FBB-4F3C-BFDD-FC4681CB5FBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FBFBACD8-8A7C-4460-8630-08A770DCF31E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6C84F735-8DF6-4C1E-9C85-C5D23C636CEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7D4D2475-1FDD-4B6B-95E2-2CF47C3DD53E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B3BCE063-8093-459B-9358-2DE44B49FF33"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0ACB0DB5-98B1-4F0A-A668-6237A4EB2770"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F25FDA11-9398-4595-814E-1A5470BD76AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.11:*:*:*:*:*:*:*",
"matchCriteriaId": "862B468F-EDA7-4CB8-81D7-BBCFC2E37E3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.12:*:*:*:*:*:*:*",
"matchCriteriaId": "35EBD4F5-FB10-44D6-9E28-130ECDAF5673"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.13:*:*:*:*:*:*:*",
"matchCriteriaId": "4EA0D3EB-4F12-4BBC-BA04-C4A2169E243E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.14:*:*:*:*:*:*:*",
"matchCriteriaId": "01BA8DC0-35CF-43CD-95E5-1A245CC7724C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nginx:nginx:0.6.1516:*:*:*:*:*:*:*",
"matchCriteriaId": "0CAB85AB-3C58-4AF3-B5C8-4E48A01252B6"
}
]
}
]
}
],
"references": [
{
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552035",
"source": "secalert@redhat.com",
"tags": [
"Exploit"
]
},
{
"url": "http://marc.info/?l=nginx&m=125692080328141&w=2",
"source": "secalert@redhat.com"
},
{
"url": "http://secunia.com/advisories/48577",
"source": "secalert@redhat.com"
},
{
"url": "http://security.debian.org/pool/updates/main/n/nginx/nginx_0.4.13-2+etch3.diff.gz",
"source": "secalert@redhat.com"
},
{
"url": "http://security.gentoo.org/glsa/glsa-201203-22.xml",
"source": "secalert@redhat.com"
},
{
"url": "http://sysoev.ru/nginx/patch.null.pointer.txt",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.debian.org/security/2009/dsa-1920",
"source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/11/20/1",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/11/20/6",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/11/23/10",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/36839",
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539565",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html",
"source": "secalert@redhat.com"
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html",
"source": "secalert@redhat.com"
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html",
"source": "secalert@redhat.com"
},
{
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552035",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://marc.info/?l=nginx&m=125692080328141&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/48577",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://security.debian.org/pool/updates/main/n/nginx/nginx_0.4.13-2+etch3.diff.gz",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://security.gentoo.org/glsa/glsa-201203-22.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://sysoev.ru/nginx/patch.null.pointer.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.debian.org/security/2009/dsa-1920",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/11/20/1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/11/20/6",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/11/23/10",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/36839",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539565",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI."
}
},
"CVE-2009-3898": {
"cached_at": "2026-04-25T01:57:09.274505+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2009-3898",
"sourceIdentifier": "secalert@redhat.com",
"published": "2009-11-24T17:30:00.437",
"lastModified": "2026-04-23T00:35:47.467",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en src/http/modules/ngx_http_dav_module.c en nginx (como Engine X) anterior v0.7.63, y v0.8.x anterior v0.8.17, permite a usuarios autentificados remotamente crear y sobrescribir archivos de su elecci\u00f3n a trav\u00e9s de .. (punto punto) en la cabecera HTTP Destination para el WebDAV (1) COPY o (2) m\u00e9etodo MOVE."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"baseScore": 4.9,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.7.62",
"matchCriteriaId": "FD62197E-3FD8-4DFE-87A5-26158E39F6E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "34E64473-58DC-4158-BB07-071A670CDC49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC9B36B-CC2F-442F-AEF6-F911AFEE966A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "44AE0F17-F320-40FA-AD43-E4C22FE3B455"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3CF8D9C0-99DE-4EB9-8EE1-C4EBBDF8F060"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E53B582A-8EE0-4FE0-8B86-6068E8F28F72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D6139614-6835-4295-9D1F-1686D28C2D18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DF8FD201-BCEF-409C-8442-B15727893F23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3130F07A-9524-4DF0-83F8-32E13341E0AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BC716174-E211-4497-8AD6-49AC6CB2776A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5F06259F-0848-428E-A9C3-9A96C4018EBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1DABF871-39BB-4DAC-B4FA-EF2C96CF3D9A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "012FF2E6-D51D-4233-B961-F4E0EDC5A83F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "AA0B3776-F86D-40CB-8372-722B49F44672"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "8C434DCD-B225-4BB5-B3A1-50C4338967BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "20DA7234-6824-49D4-85D5-90C10950A884"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "FE5D29F6-18F4-41DE-A4FC-1F4387622C40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9A21A021-2231-4639-973F-B626869127C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "581C97AC-A2A2-4C00-821A-223FE795E1AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "EE3669C7-BDB1-4D3A-97A2-B32F8169E160"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "B95F8086-EBA4-447C-8D5B-57AB1BDB7C86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "BD5AB833-DF18-4D5A-8C83-D8CDDE09DCF4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "D73F74AD-C174-46E0-8F15-63E1D24522A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "04E8B6C4-7D39-464D-ACF0-4C8B0E1BA4F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "762CB3D2-FDBD-4C15-A6FB-9C571E54CB4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "A8187A09-E624-494E-9D0B-4915227CD0C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "CFFD2EC6-7600-4A14-901E-A09872FA34E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "71A4BEE0-0AE1-4F0B-BE6B-94DEAA4AC4ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.27:*:*:*:*:*:*:*",
"matchCriteriaId": "C1AA69A1-E4A0-4541-9683-C7926876EC15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.28:*:*:*:*:*:*:*",
"matchCriteriaId": "A081CD0C-583C-4702-80A7-5EB83F1F2222"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.29:*:*:*:*:*:*:*",
"matchCriteriaId": "BB538A03-5C14-416C-ABC8-3CF6F40AC74D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7CE79D-2141-4786-8F5A-75475A997A26"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "BC95E17A-13E0-418D-BAB3-5DE38B64BCAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "B511DE8A-03C1-45CC-BFAD-5CBAD08051D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.33:*:*:*:*:*:*:*",
"matchCriteriaId": "A36CF460-5D9E-4F92-A5FB-67B2CF6F9C5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.34:*:*:*:*:*:*:*",
"matchCriteriaId": "369C67DE-3FC6-4789-96E4-A56DDF24674E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.35:*:*:*:*:*:*:*",
"matchCriteriaId": "24FF9759-62E5-4E80-A8E8-B01FAAB75BA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.36:*:*:*:*:*:*:*",
"matchCriteriaId": "BB185CAF-795D-4945-B0D6-568936D0A102"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.37:*:*:*:*:*:*:*",
"matchCriteriaId": "6EDF43E1-7334-44B1-9BDD-EE543AFA239C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.38:*:*:*:*:*:*:*",
"matchCriteriaId": "B03BF1D6-A0BF-42DA-8319-C4CF551F909D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.39:*:*:*:*:*:*:*",
"matchCriteriaId": "D5E34697-5F0B-4189-8E02-DF310DB2B11D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "03071B0A-666F-46FC-B1EF-6498384D446C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "D88341D2-BF1E-40BD-B3EB-EB5D7C80CBE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.42:*:*:*:*:*:*:*",
"matchCriteriaId": "11B039BA-92B2-48EC-A419-31C0C429C339"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "AC1AF8B0-9A94-4EBF-B164-9EE4298D0FCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "58F7209C-A5A1-4F2D-91C4-A130F46ABC88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.1.45:*:*:*:*:*:*:*",
"matchCriteriaId": "F2604E43-1C77-42DD-B396-5A25B0A39850"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "26139CB0-8BAD-4BF2-8BAC-1B228B5F561F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CA4F8E-D458-4DC8-97BA-9F7ADC85429D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F062FD01-831F-46B4-9C7A-492B5F5A525B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "93021C52-5F88-450E-A0FA-1E7AD4BF4A6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F47DF42F-EBA9-4E75-933C-53A0CE9691C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "72C527B7-EEDA-4013-BCEA-AEA5F5A889C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8868A8E3-4299-4796-8A96-EC402E3998F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93E7B28C-9D1A-49B5-8A54-9555B08471C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F6D6360-9C6C-4CE5-82F2-8BE2AF41A4E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF59F965-59C2-4759-A4FF-D828CF515812"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "62E97F69-C178-4F7F-8472-6147DF22E69E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FCD01A-6B3E-4B29-AAB2-A3EFB3965B27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "372E2B59-085D-4E64-9F77-BEDE0FAFE3F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FDCC283B-FF74-47F3-AAEC-3A99110290C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "58286494-21A9-4AC7-B9A7-58D2B9860374"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BF99C635-748F-49A8-940B-5AB48213D6F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C1AA5F7E-F36E-4FF4-B9BF-D307D7F8408D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "163AE467-E1C1-48D4-B2FA-9F28D99D8CD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2055FAFE-54CA-4E45-8818-E27D77BD25D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F3DD8251-9808-48F0-8ED2-04189BAC83E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2B394B65-D904-4D26-BEF7-55CD151D0830"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "F98696CC-3329-4A16-BEF0-ABB1171CA263"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "B37C15B1-7752-45AA-89AE-C770AFA032B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "62AECD27-1854-4E6C-8CFB-47B7C71AC70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "3DB0F596-17BF-4324-9E2E-9A3D5AC3E533"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "6DBE5715-7673-4620-81EA-972A5CA7DEE7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "1589B6E4-6647-40F6-B34F-4064A068E3ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.20:*:*:*:*:*:*:*",
"matchCriteriaId": "DE8DF630-0EEF-4D69-BAE0-F433D2682D50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.21:*:*:*:*:*:*:*",
"matchCriteriaId": "5E844090-43AA-4846-9850-15573DA320DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.22:*:*:*:*:*:*:*",
"matchCriteriaId": "75E1BB11-1D9F-43E3-A215-BC8FFE3B2912"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.23:*:*:*:*:*:*:*",
"matchCriteriaId": "0040B3E4-A2CC-45CF-B2E2-B03C56344CE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.24:*:*:*:*:*:*:*",
"matchCriteriaId": "D46650F1-CCBC-42BD-9D6E-D07A6EC7A58A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.25:*:*:*:*:*:*:*",
"matchCriteriaId": "F33D99A0-5AC9-445B-8C68-204B1E2A1B42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.26:*:*:*:*:*:*:*",
"matchCriteriaId": "52D78B06-0826-44E4-AB0C-61C77BEB0598"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.27:*:*:*:*:*:*:*",
"matchCriteriaId": "8F98F843-0D15-4455-900B-20719D285B56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.28:*:*:*:*:*:*:*",
"matchCriteriaId": "DBE32950-F476-446F-BFC4-EC5120D6CE61"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.29:*:*:*:*:*:*:*",
"matchCriteriaId": "3E3E1C4A-2CFC-43A0-B246-5199B41A7C29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.30:*:*:*:*:*:*:*",
"matchCriteriaId": "B9C85B18-40E5-42F0-886C-19FABD5D397B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.31:*:*:*:*:*:*:*",
"matchCriteriaId": "46C8CD08-073E-4611-B2D1-66C0BB5B00F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.32:*:*:*:*:*:*:*",
"matchCriteriaId": "C4EF6E8E-4E8D-4BAD-ACB0-FB38CD048A65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.33:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BEE011-B625-4227-8A24-92A4BDAF6F32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.34:*:*:*:*:*:*:*",
"matchCriteriaId": "1F952AF9-7917-4FE6-AA61-79410453FBF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.35:*:*:*:*:*:*:*",
"matchCriteriaId": "D54B2662-A8E6-4754-BDE4-640FB9A8F979"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.36:*:*:*:*:*:*:*",
"matchCriteriaId": "0964C0F0-BFB6-47F4-BC8B-ACC772FA82CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.37:*:*:*:*:*:*:*",
"matchCriteriaId": "DD44DA86-3AC7-490C-B690-44F1CAC94BD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.38:*:*:*:*:*:*:*",
"matchCriteriaId": "A94073D1-E657-4E92-985A-00427E17A485"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.39:*:*:*:*:*:*:*",
"matchCriteriaId": "89988EAE-D4E8-49D6-98E8-246A7D98D4BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.40:*:*:*:*:*:*:*",
"matchCriteriaId": "6496AFD5-3232-4BA8-8404-D5E286B6BCE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.41:*:*:*:*:*:*:*",
"matchCriteriaId": "E68A4F70-1335-427F-8916-90B5F25E786F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC479CA-500E-4A45-8435-D5E55DD4D281"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.43:*:*:*:*:*:*:*",
"matchCriteriaId": "F15289EE-16F1-4B71-89BD-36A03607326B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.44:*:*:*:*:*:*:*",
"matchCriteriaId": "67BAF1E6-913A-4856-80BF-4A39863E8DB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.45:*:*:*:*:*:*:*",
"matchCriteriaId": "81294D2E-D087-40EF-96B8-2D6C5D33F09C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.46:*:*:*:*:*:*:*",
"matchCriteriaId": "1774A68D-33A8-4DBD-ADF1-143FBE7BBBB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.47:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8BEBBC-44CD-4994-BCB4-AB90C1FE4315"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.48:*:*:*:*:*:*:*",
"matchCriteriaId": "EBE5CC5C-8E80-483F-876E-6D4A6FE0E9A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.49:*:*:*:*:*:*:*",
"matchCriteriaId": "AA4CB751-91CE-4FAD-A54B-FEA780AF094E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.50:*:*:*:*:*:*:*",
"matchCriteriaId": "BED74A8F-C022-469F-8F6C-25C8C9D2696E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "136D17BD-CC63-4427-A139-C9FA72D6D42B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.52:*:*:*:*:*:*:*",
"matchCriteriaId": "94C19287-D201-40CA-B6E4-F89DE786F967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.53:*:*:*:*:*:*:*",
"matchCriteriaId": "6938773B-2874-48E1-866B-2E9286BFCB7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.54:*:*:*:*:*:*:*",
"matchCriteriaId": "704C5C74-2154-4DB8-AFE4-8A9FCA8B75C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.55:*:*:*:*:*:*:*",
"matchCriteriaId": "8DEEACA6-935B-432D-AE61-E7C6A0383EBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.56:*:*:*:*:*:*:*",
"matchCriteriaId": "166361C6-183D-487E-A423-7A24CE0397F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.57:*:*:*:*:*:*:*",
"matchCriteriaId": "48678CF2-0C88-440B-AA49-C705A72C75D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.58:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB80FD7-FC22-4911-89D4-95A502FABE03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.59:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFE1CA3-993C-4E9A-880A-AE2581390BF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.60:*:*:*:*:*:*:*",
"matchCriteriaId": "B3359813-9345-4F3A-8F29-BDAB8A42A971"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.3.61:*:*:*:*:*:*:*",
"matchCriteriaId": "FCDE4A4D-FB19-4BAC-B2C9-E07C5F5705C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "565C6100-5502-49A6-8F17-53921FC243C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB82464D-E387-4844-9021-FF7195F905B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "69A6688A-DF98-4433-91CC-FE6FDEC3968A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1DD81AF6-B55B-47A7-8F29-C135F33FA7D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0C0CA98A-C99A-4021-BF38-4FB5184D0E93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F962CE1E-218F-4FBE-A4ED-922988D3BA91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EEC5AB3B-32FA-4AD5-8E31-573D4DCABBF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8388B1-8C01-49DD-BF3C-3C3B0FEA1F56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C625397F-DF52-4ED9-90AE-7CBCE56AECE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1582E4C7-83A0-45E5-B7E1-CDB22BDB17B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2EDF7DB8-C9C0-47E4-85AF-D195BFCE426E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "97532F9D-CED0-466A-9E65-276E68972897"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "373A5785-1113-425F-9E7F-DF58E0DFF3E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F713F0D0-0E1B-45A3-90C3-AB9ED5666A65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC4C3A9-324E-4006-B0C9-966C144A02EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB7BA5F-AF0A-4282-AABA-F57C3BC425FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8B8800DB-A500-47FA-AD71-F3012D9E6C38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E7D68735-877D-4A5A-BCE4-9204C06A877C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B994025A-5AA0-4ACB-B830-AD84578EE935"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E612C3BE-89AB-47FC-9B65-11EC3FA53A20"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B6137B44-F31E-49EF-8249-68C7B19DBF6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AADCADD7-2EEE-4397-B737-4FD071694C0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8C3EC4EA-722D-4767-B271-E5E94A61B2A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C7BD35FB-0406-45A4-983F-23FCB9AD8EA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "845EAF67-F86C-47FF-AD63-424FC5FE3344"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "99ED4116-D874-463C-8A62-56297CFF02D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "72C6A905-8CF0-44F4-B67C-7D55D22BFD9F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9A5DE1-9728-4E9B-AA3A-FFFDB90A4D17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "079D51E9-82F2-4ECF-8711-42A1E8BF3AFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "473D1711-E4A2-4979-AA10-B3439036D8C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "E056E5DB-C16C-461F-885E-B516A3C3C880"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "94ACFB0D-7EF1-4E83-8A75-EB843398F7AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1D3DCD04-DD8B-4B8E-A9B2-0999C8D6F088"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "BBFFF0B8-F20D-4197-A3F9-8CAAC784E4A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "365BC524-97F9-47AD-8ECD-0FF60B55BD12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.21:*:*:*:*:*:*:*",
"matchCriteriaId": "745F4FAC-AD36-469C-B54D-F695146F9FFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.22:*:*:*:*:*:*:*",
"matchCriteriaId": "EB8B6F37-4CE1-4DEF-BDE9-EC9BA422F543"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.23:*:*:*:*:*:*:*",
"matchCriteriaId": "E82535AE-E45A-45EE-8303-4F8EC461F4C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.24:*:*:*:*:*:*:*",
"matchCriteriaId": "9526A9D2-05DB-4DD2-BE87-0FEA6A9E52E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.25:*:*:*:*:*:*:*",
"matchCriteriaId": "C72B94DF-B4C1-40F7-A3FD-5EEE64119816"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.26:*:*:*:*:*:*:*",
"matchCriteriaId": "C642F33D-3A9E-4576-B831-556AA4902ED8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.27:*:*:*:*:*:*:*",
"matchCriteriaId": "0E69078D-579F-48AD-8BC7-2EEA06DCA02A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.28:*:*:*:*:*:*:*",
"matchCriteriaId": "535E9578-88F5-430E-8DBA-0E324C1362BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.29:*:*:*:*:*:*:*",
"matchCriteriaId": "B5022F10-D091-4D53-8476-53DBDC304B8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.30:*:*:*:*:*:*:*",
"matchCriteriaId": "7E1CE05D-A611-4854-8BC4-C58C2F4723FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.31:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD5BD39-95EF-4157-9CFC-A69FD782051F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.32:*:*:*:*:*:*:*",
"matchCriteriaId": "16CF4D49-A36D-40BF-B198-CBA04A4BC55A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.33:*:*:*:*:*:*:*",
"matchCriteriaId": "6E621C1A-2A94-477C-A22C-2512028F46AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.34:*:*:*:*:*:*:*",
"matchCriteriaId": "4A5F41CC-69EA-4C49-8E59-9D352F760E3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.35:*:*:*:*:*:*:*",
"matchCriteriaId": "D77FF714-F370-484C-BA9F-48C3897D95D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.36:*:*:*:*:*:*:*",
"matchCriteriaId": "0977CC72-8588-4148-BBB3-8B2811040467"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.5.37:*:*:*:*:*:*:*",
"matchCriteriaId": "2058F887-2DE6-4837-B758-16D4D31AE625"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0D4AEFBC-4141-4B17-8449-6796B27718A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4773F9A8-5E43-4DBB-8BC9-7A3FF07AA54D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "873B5C88-11A9-4F77-BBD1-F468067B83BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0E6E2758-B282-4AB6-861C-5909AC811ECF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F21C4FD5-B9B4-4D88-A158-2BB1A92C5C2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B0B12A7-8D8E-4D75-A3E6-CE92C0F124D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "72914EBD-C4F4-4BCD-9613-583CB98562A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "93BD0D22-9EB6-40E0-AE14-EFC79C249454"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "782E7ED3-06BF-42C6-A2CF-29C4962C328C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "97D0B1F9-CE07-4A87-8512-BCAD25B7DA86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3DAC5268-E39F-4D92-ADAC-05FBBF60E929"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "45490E90-DD0F-4DC6-95C9-79420726B6BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "2A9F1EC1-1610-43B9-8A72-2CC0DE6D5B82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "265CB602-4C78-497C-8E5C-758AC764D1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "97CD6E57-3B28-406E-97B7-00B516E209F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "71B7EE8C-2C13-4F5C-8E78-57B48B872193"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A58D8933-5E4C-452F-95DF-B52DF9597A30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "E309D12E-2635-4DC7-B63E-AC8120402031"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.19:*:*:*:*:*:*:*",
"matchCriteriaId": "CD498ABB-A75A-4C0A-A038-CE98C60A1E67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.20:*:*:*:*:*:*:*",
"matchCriteriaId": "B7FD994B-C52A-43E9-BDCF-C4DA80A56ED6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2D7132AC-0824-474B-A1EA-1E7A8FA5692A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.22:*:*:*:*:*:*:*",
"matchCriteriaId": "5FE4DE37-F9CD-41AD-80D8-EA8FE4FDC4F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.23:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD802A9-6934-40A2-9EE5-E30A86BAF58B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.24:*:*:*:*:*:*:*",
"matchCriteriaId": "38DAA70B-2E2F-4A99-AF7A-690C8A819F12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.25:*:*:*:*:*:*:*",
"matchCriteriaId": "1413E07A-A8AD-40E4-8E53-F031DF8D8C5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.26:*:*:*:*:*:*:*",
"matchCriteriaId": "6FECFF93-AAA7-4F75-A7F8-957505A399C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.27:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C141D8-018B-4894-9D2A-3DDF13A27144"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.28:*:*:*:*:*:*:*",
"matchCriteriaId": "EB96A11F-9BD6-4A5D-99B8-B9269D853AE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.29:*:*:*:*:*:*:*",
"matchCriteriaId": "938A7EF3-E292-4CC2-B6CF-3CCCC4E5C892"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.30:*:*:*:*:*:*:*",
"matchCriteriaId": "1502DF53-1944-4352-87E6-1CDD333112BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.31:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6D10FB-7099-41CE-8D81-F133D2968D77"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.32:*:*:*:*:*:*:*",
"matchCriteriaId": "55743854-1678-40C1-917D-FD4711DAFD97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.33:*:*:*:*:*:*:*",
"matchCriteriaId": "B05BE618-3054-42F0-932E-35D711D9E959"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.34:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD3717C-6049-4FF5-A3AC-53A262C93447"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.35:*:*:*:*:*:*:*",
"matchCriteriaId": "1E6BE57C-901A-4B7D-84F3-AFC79118949D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.36:*:*:*:*:*:*:*",
"matchCriteriaId": "4FD98F9B-9A77-44F2-8CBE-5EE53E2CB2D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.37:*:*:*:*:*:*:*",
"matchCriteriaId": "D8FE0346-1D52-4AAF-8593-859FC85AC520"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.6.38:*:*:*:*:*:*:*",
"matchCriteriaId": "00E4C8C0-02C4-45A3-BFB4-3795318D7EFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8BE564-9784-46A4-9712-6BE812B757E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "09EB5ECD-D851-4FD1-838E-01CD779C4707"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "872B3995-3D72-4BBE-B8C5-E2142390B394"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AA55740C-C77E-4B75-B7A2-8950E0673DED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D2B423AB-4283-47F6-BA44-FD76E4FA2558"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C51C9E-C83C-4E86-B91B-A6001CDC3D78"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D80F4C49-8CD5-4EB9-9346-12EE143004F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "94DE340D-782B-42B2-8EDF-DD8584C52703"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F137967D-9A3A-44B8-8E41-56D42AC9FBFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "9E47C74C-697B-48C1-A20E-E30B1EB115AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2B8B0F-C5E9-4DDE-A303-24E63B5C486A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A9FE0645-873B-48E1-8D67-B6E9CE41EE76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A2136748-7ADD-48FE-85C7-C7FDF3DFC7B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E4738D-5A55-4142-BF7D-C5FBE6AD92C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.14:*:*:*:*:*:*:*",
"matchCriteriaId": "2F41A657-FB84-40A4-A812-4A940C19C563"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.15:*:*:*:*:*:*:*",
"matchCriteriaId": "6128BCAB-B6C1-45EA-90EB-D341A0BBBCDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.16:*:*:*:*:*:*:*",
"matchCriteriaId": "40921150-A75E-44DB-947D-948BB6FD95FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.17:*:*:*:*:*:*:*",
"matchCriteriaId": "3B5A48B6-3F34-4C36-AB4F-389F8C6F99A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.18:*:*:*:*:*:*:*",
"matchCriteriaId": "41C8D846-A1E8-4CF9-9D51-37A80BA1DDBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.19:*:*:*:*:*:*:*",
"matchCriteriaId": "4A755328-5783-4F2C-A831-4AF52A263984"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.20:*:*:*:*:*:*:*",
"matchCriteriaId": "6027BA55-6D4E-44AD-B1E2-9BC7E219DD00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.21:*:*:*:*:*:*:*",
"matchCriteriaId": "DE76724B-F1B6-4DF6-97A6-9A5C9A7539BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.22:*:*:*:*:*:*:*",
"matchCriteriaId": "7E2D3916-7C5A-4253-B7DB-CA4A17658439"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.23:*:*:*:*:*:*:*",
"matchCriteriaId": "00D9F246-2B22-453B-9078-5A9E44C000C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.24:*:*:*:*:*:*:*",
"matchCriteriaId": "1E558BFF-F580-4D06-92C3-C0799890A6BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.25:*:*:*:*:*:*:*",
"matchCriteriaId": "8771DE53-EEB6-4846-82C0-E97A23F9FC7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.26:*:*:*:*:*:*:*",
"matchCriteriaId": "6496DB0E-3A64-4006-A07F-4031117900CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.27:*:*:*:*:*:*:*",
"matchCriteriaId": "7241B5EB-341D-4788-82D5-AE88BC19B0D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.28:*:*:*:*:*:*:*",
"matchCriteriaId": "9432C71C-B324-4A8A-A2C7-6295DD06A979"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.29:*:*:*:*:*:*:*",
"matchCriteriaId": "6D80AEDB-523A-4C07-B34D-969B43995A4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.30:*:*:*:*:*:*:*",
"matchCriteriaId": "96DB2832-B421-47CC-B5BF-3264722D1F58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.31:*:*:*:*:*:*:*",
"matchCriteriaId": "CD8292E6-E9E9-4A5C-ABB5-21B30B793BAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.32:*:*:*:*:*:*:*",
"matchCriteriaId": "D74E1F34-F3B9-49B4-886C-3EACB4A39181"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.33:*:*:*:*:*:*:*",
"matchCriteriaId": "0399B66B-4C3C-46A8-BB4A-228AE7825F83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.34:*:*:*:*:*:*:*",
"matchCriteriaId": "0B64AC40-DFFD-4892-8ECC-809C62D57B23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.35:*:*:*:*:*:*:*",
"matchCriteriaId": "409B886B-1C92-4A92-ABBE-258FD13D6EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.36:*:*:*:*:*:*:*",
"matchCriteriaId": "B97D7354-FEA3-489D-93DB-29F3BDAFCFCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.37:*:*:*:*:*:*:*",
"matchCriteriaId": "AC1FE7B7-EE24-4C52-B6F7-7D8DC7436BD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.38:*:*:*:*:*:*:*",
"matchCriteriaId": "784FC15D-C0A9-4921-9FE0-13D68113979B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.39:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B49550-58F4-4E17-AA7F-C6E68381D6F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.40:*:*:*:*:*:*:*",
"matchCriteriaId": "199C31D9-564B-4DCE-90F8-DCC5185B157D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.41:*:*:*:*:*:*:*",
"matchCriteriaId": "1A0D6DF2-7295-4048-9357-598DF38B1D07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.42:*:*:*:*:*:*:*",
"matchCriteriaId": "70D35BED-F2B4-47C7-8A5B-CB2A7FFBFFAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.43:*:*:*:*:*:*:*",
"matchCriteriaId": "34446D8A-05E3-4CBC-88AE-94D1ED9B42CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.44:*:*:*:*:*:*:*",
"matchCriteriaId": "37BEDAAF-8818-47A2-B6F7-D8D69000A1D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.45:*:*:*:*:*:*:*",
"matchCriteriaId": "5CC7F6E8-87FE-4502-BE4C-733BCFD6E7BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.46:*:*:*:*:*:*:*",
"matchCriteriaId": "48DDBA8F-1676-4D23-BF0C-8858A95FF43B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.47:*:*:*:*:*:*:*",
"matchCriteriaId": "AA06F94F-B5E2-44B1-A313-256118FC0F1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.48:*:*:*:*:*:*:*",
"matchCriteriaId": "E3991D34-1D58-421A-87A8-DBBC225E64DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.49:*:*:*:*:*:*:*",
"matchCriteriaId": "574572C4-5359-48A4-BC48-8A740929601E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.50:*:*:*:*:*:*:*",
"matchCriteriaId": "B250BCDB-01E9-47BE-BF2A-42253083DF84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.51:*:*:*:*:*:*:*",
"matchCriteriaId": "69B7BD47-4AE6-4A8B-8773-97D4E47AA8EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.52:*:*:*:*:*:*:*",
"matchCriteriaId": "14412552-C2D6-4E24-8A5A-258DCFA1FD19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.53:*:*:*:*:*:*:*",
"matchCriteriaId": "54C84DD5-73DB-40E3-A930-8467CE5391C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.54:*:*:*:*:*:*:*",
"matchCriteriaId": "86840620-5641-49F2-8803-197C1E1D42A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.55:*:*:*:*:*:*:*",
"matchCriteriaId": "CDB2D731-F2CA-43FF-A170-BD3BA89C4F88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.56:*:*:*:*:*:*:*",
"matchCriteriaId": "839AA5EB-FF21-44ED-A340-5B1BC444E649"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.57:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B48748-5B9C-4D77-BE1F-9C7A436ECA5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.58:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D4C93E-8A58-4B8D-A2F9-79A1D3526FDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.59:*:*:*:*:*:*:*",
"matchCriteriaId": "0750BECB-3AB8-4A80-8D4D-F0CBA11F3E37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.60:*:*:*:*:*:*:*",
"matchCriteriaId": "E9231C67-A182-441C-9148-BB1CDE6AFF55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.61:*:*:*:*:*:*:*",
"matchCriteriaId": "3091F4CB-D14A-4BCA-8155-119AE7716360"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20A0F5C4-7FCE-4666-9B14-D0B1D4CDF23F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2192AF4D-7BEF-4A16-B8BE-86256006759D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC06391-07A4-4CC5-BE4E-9AB47956D1C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9617C1F3-52F5-4830-9477-91E8853A1A15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3396AE2A-9FBB-4F3C-BFDD-FC4681CB5FBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FBFBACD8-8A7C-4460-8630-08A770DCF31E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6C84F735-8DF6-4C1E-9C85-C5D23C636CEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7D4D2475-1FDD-4B6B-95E2-2CF47C3DD53E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B3BCE063-8093-459B-9358-2DE44B49FF33"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0ACB0DB5-98B1-4F0A-A668-6237A4EB2770"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F25FDA11-9398-4595-814E-1A5470BD76AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.11:*:*:*:*:*:*:*",
"matchCriteriaId": "862B468F-EDA7-4CB8-81D7-BBCFC2E37E3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.12:*:*:*:*:*:*:*",
"matchCriteriaId": "35EBD4F5-FB10-44D6-9E28-130ECDAF5673"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.13:*:*:*:*:*:*:*",
"matchCriteriaId": "4EA0D3EB-4F12-4BBC-BA04-C4A2169E243E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.14:*:*:*:*:*:*:*",
"matchCriteriaId": "01BA8DC0-35CF-43CD-95E5-1A245CC7724C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.8.15:*:*:*:*:*:*:*",
"matchCriteriaId": "904F3781-AF6C-4BA3-8794-512CECAB8208"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nginx:nginx:0.6.1516:*:*:*:*:*:*:*",
"matchCriteriaId": "0CAB85AB-3C58-4AF3-B5C8-4E48A01252B6"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-09/0379.html",
"source": "secalert@redhat.com",
"tags": [
"Exploit"
]
},
{
"url": "http://marc.info/?l=oss-security&m=125897327321676&w=2",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://marc.info/?l=oss-security&m=125897425223039&w=2",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://marc.info/?l=oss-security&m=125900327409842&w=2",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://secunia.com/advisories/36818",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/48577",
"source": "secalert@redhat.com"
},
{
"url": "http://security.gentoo.org/glsa/glsa-201203-22.xml",
"source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/11/20/1",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/11/23/10",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-09/0379.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://marc.info/?l=oss-security&m=125897327321676&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://marc.info/?l=oss-security&m=125897425223039&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://marc.info/?l=oss-security&m=125900327409842&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://secunia.com/advisories/36818",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/48577",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://security.gentoo.org/glsa/glsa-201203-22.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/11/20/1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/11/23/10",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method."
}
},
"CVE-2009-4487": {
"cached_at": "2026-04-25T01:57:10.350428+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2009-4487",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-01-13T20:30:00.357",
"lastModified": "2026-04-23T00:35:47.467",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator."
},
{
"lang": "es",
"value": "nginx v0.7.64, escribe datos en un archivo de los sin depurar los caracteres no escribibles, lo que podr\u00eda permitir a atacantes remotos modificar la ventana de t\u00edtulo, o posiblemente ejecutar comandos de su elecci\u00f3n o sobrescribir archivos, a trav\u00e9s de una petici\u00f3n HTTP que contiene una secuencia de escape para el emulador de terminal."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:0.7.64:*:*:*:*:*:*:*",
"matchCriteriaId": "16FDFF79-9B8D-4CA5-84F4-ED8999023B10"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/archive/1/508830/100/0/threaded",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/37711",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/508830/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/37711",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator."
}
},
"CVE-2010-2263": {
"cached_at": "2026-04-25T01:57:11.423117+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2010-2263",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-06-15T14:04:24.313",
"lastModified": "2025-04-11T00:51:21.963",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI."
},
{
"lang": "es",
"value": "nginx 0.8 en versiones anteriores a la 0.8.40 y 0.7 en versiones anteriores a la 0.7.66, al ser ejecutado en Windows, permite a atacantes remotos obtener c\u00f3digo fuente o contenido sin interpretar de ficheros de su elecci\u00f3n que est\u00e9n bajo la ra\u00edz de documentos web a\u00f1adiendo ::$DATA a la URI."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.7.52",
"versionEndExcluding": "0.7.66",
"matchCriteriaId": "1B338639-BD28-4073-8874-7D4013E23282"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.8.0",
"versionEndIncluding": "0.8.39",
"matchCriteriaId": "494A2664-A392-4F3F-B15A-B31FF474BBB5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "http://spa-s3c.blogspot.com/2010/06/full-responsible-disclosurenginx-engine.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Release Notes",
"Third Party Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/13818",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.exploit-db.com/exploits/13822",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/40760",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://spa-s3c.blogspot.com/2010/06/full-responsible-disclosurenginx-engine.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Release Notes",
"Third Party Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/13818",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.exploit-db.com/exploits/13822",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/40760",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI."
}
},
"CVE-2010-2266": {
"cached_at": "2026-04-25T01:57:12.674604+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2010-2266",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-06-15T14:04:24.420",
"lastModified": "2025-04-11T00:51:21.963",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the \"%c0.%c0.\" sequence."
},
{
"lang": "es",
"value": "nginx v0.8.36 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (mediante ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de ciertas secuencias codificadas de salto de directorio que provocan corrupci\u00f3n de memoria, como se demuestra usando la secuencia \"%c0.%c0.\" ."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.7.52",
"versionEndExcluding": "0.7.67",
"matchCriteriaId": "134B3FD6-2125-4A8B-8107-FE8AE09F4249"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.8.0",
"versionEndIncluding": "0.8.40",
"matchCriteriaId": "535B4F85-4BDD-4231-A09E-1E4733920C8B"
}
]
}
]
}
],
"references": [
{
"url": "http://www.exploit-db.com/exploits/13818/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.exploit-db.com/exploits/13818/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the \"%c0.%c0.\" sequence."
}
},
"CVE-2011-4315": {
"cached_at": "2026-04-25T01:57:13.828366+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2011-4315",
"sourceIdentifier": "secalert@redhat.com",
"published": "2011-12-08T20:55:01.000",
"lastModified": "2025-04-11T00:51:21.963",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en el procesamiento de compresi\u00f3n puntero en core/ngx_resolver.c en nginx antes de v1.0.10 permite a resolvers remotos causar una denegaci\u00f3n de servicio (ca\u00edda del demonio) o posiblemente tener un impacto no especificado a trav\u00e9s de una respuesta larga."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.6.18",
"versionEndExcluding": "1.0.10",
"matchCriteriaId": "4F92F127-6CBE-43EE-9E40-3FA89656A225"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1.0",
"versionEndIncluding": "1.1.7",
"matchCriteriaId": "67542E52-9201-4AC8-BB9E-0F93D7DC968C"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*",
"matchCriteriaId": "706C6399-CAD1-46E3-87A2-8DFE2CF497ED"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suse:studio:1.2:*:*:*:standard:*:*:*",
"matchCriteriaId": "234A6341-7A0E-42BB-A653-11064B6F110C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suse:studio_onsite:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E523A94D-9ECA-43C2-B96F-0D2C77D3F952"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suse:webyast:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C3DB92F3-F16A-4304-AA90-DB5325814F6C"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-December/070569.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00005.html",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://openwall.com/lists/oss-security/2011/11/17/10",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://openwall.com/lists/oss-security/2011/11/17/8",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/47097",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/48577",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-201203-22.xml",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://trac.nginx.org/nginx/changeset/4268/nginx",
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.nginx.org/en/CHANGES-1.0",
"source": "secalert@redhat.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/50710",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-December/070569.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00005.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://openwall.com/lists/oss-security/2011/11/17/10",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://openwall.com/lists/oss-security/2011/11/17/8",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/47097",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/48577",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-201203-22.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://trac.nginx.org/nginx/changeset/4268/nginx",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.nginx.org/en/CHANGES-1.0",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/50710",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response."
}
},
"CVE-2012-1180": {
"cached_at": "2026-04-25T01:57:14.986986+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2012-1180",
"sourceIdentifier": "secalert@redhat.com",
"published": "2012-04-17T21:55:01.227",
"lastModified": "2025-04-11T00:51:21.963",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request."
},
{
"lang": "es",
"value": "Una vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en nginx v1.0.14 y v1.1.x antes de v1.1.17 permite obtener informaci\u00f3n sensible de la memoria del proceso a servidores remotos de HTTP a trav\u00e9s de una respuesta del backend modificada, junto con una petici\u00f3n de cliente."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.1.0",
"versionEndExcluding": "1.0.14",
"matchCriteriaId": "343EDF1A-0A61-4399-88AC-CAC4F670BC19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1.0",
"versionEndExcluding": "1.1.17",
"matchCriteriaId": "7194EAE0-70A4-47B9-A7D6-71EC56F33D52"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*",
"matchCriteriaId": "9396E005-22D8-4342-9323-C7DEA379191D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*",
"matchCriteriaId": "706C6399-CAD1-46E3-87A2-8DFE2CF497ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*",
"matchCriteriaId": "2DA9D861-3EAF-42F5-B0B6-A4CD7BDD6188"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077966.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076646.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076671.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://nginx.org/download/patch.2012.memory.txt",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://nginx.org/en/security_advisories.html",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://osvdb.org/80124",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://seclists.org/bugtraq/2012/Mar/65",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/48465",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/48577",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-201203-22.xml",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://trac.nginx.org/nginx/changeset/4530/nginx",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://trac.nginx.org/nginx/changeset/4531/nginx",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2012/dsa-2434",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:043",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/03/15/5",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/03/15/9",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52578",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1026827",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=803856",
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74191",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://hermes.opensuse.org/messages/14173096",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077966.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076646.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076671.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://nginx.org/download/patch.2012.memory.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://nginx.org/en/security_advisories.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://osvdb.org/80124",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://seclists.org/bugtraq/2012/Mar/65",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/48465",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/48577",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-201203-22.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://trac.nginx.org/nginx/changeset/4530/nginx",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://trac.nginx.org/nginx/changeset/4531/nginx",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2012/dsa-2434",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:043",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/03/15/5",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/03/15/9",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52578",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1026827",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=803856",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74191",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://hermes.opensuse.org/messages/14173096",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request."
}
},
"CVE-2012-2089": {
"cached_at": "2026-04-25T01:57:16.210266+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2012-2089",
"sourceIdentifier": "secalert@redhat.com",
"published": "2012-04-17T21:55:01.353",
"lastModified": "2025-04-11T00:51:21.963",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file."
},
{
"lang": "es",
"value": "Un desbordamiento de b\u00fafer en ngx_http_mp4_module.c en el m\u00f3dulo de ngx_http_mp4_module en nginx v1.0.7 a v1.0.14 y en v1.1.3 a v1.1.18, cuando se usa la directiva mp4, permite a atacantes remotos causar una denegaci\u00f3n de servicio (sobrescritura de memoria) o, posiblemente, ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo MP4 especificamente creado para este fin."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.7",
"versionEndIncluding": "1.0.14",
"matchCriteriaId": "621F7555-4990-4EEA-88A1-1A12394F770B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1.3",
"versionEndIncluding": "1.1.18",
"matchCriteriaId": "B8E39F08-328D-4C29-BDA9-0D11F8B54E65"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*",
"matchCriteriaId": "9396E005-22D8-4342-9323-C7DEA379191D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*",
"matchCriteriaId": "706C6399-CAD1-46E3-87A2-8DFE2CF497ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*",
"matchCriteriaId": "2DA9D861-3EAF-42F5-B0B6-A4CD7BDD6188"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079388.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079467.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079474.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://nginx.org/en/security_advisories.html",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/04/12/9",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52999",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1026924",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74831",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079388.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079467.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079474.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://nginx.org/en/security_advisories.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/04/12/9",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52999",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1026924",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74831",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file."
}
},
"CVE-2011-4963": {
"cached_at": "2026-04-25T01:57:17.347429+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2011-4963",
"sourceIdentifier": "secalert@redhat.com",
"published": "2012-07-26T19:55:00.980",
"lastModified": "2025-04-11T00:51:21.963",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain \"$index_allocation\" sequences in a request."
},
{
"lang": "es",
"value": "nginx/Windows v1.3.x antes de v1.3.1 y v1.2.x antes de v1.2.1 permite a atacantes remotos eludir restricciones de acceso y acceder a archivos restringidos a trav\u00e9s de (1) un . (punto) final o (2) una serie de secuencias \"$index_allocation\" en una solicitud.\r\n"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.7.52",
"versionEndExcluding": "1.2.1",
"matchCriteriaId": "E14A396A-0D7D-476A-926E-DA011E8C0CB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:nginx:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "645A3263-E14F-4A55-A6C7-C1DC8A6E1D26"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "http://english.securitylab.ru/lab/PT-2012-06",
"source": "secalert@redhat.com",
"tags": [
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "http://mailman.nginx.org/pipermail/nginx-announce/2012/000086.html",
"source": "secalert@redhat.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "http://nginx.org/en/security_advisories.html",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://english.securitylab.ru/lab/PT-2012-06",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "http://mailman.nginx.org/pipermail/nginx-announce/2012/000086.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "http://nginx.org/en/security_advisories.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain \"$index_allocation\" sequences in a request."
}
},
"CVE-1999-0236": {
"cached_at": "2026-04-25T01:23:08.693384+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-1999-0236",
"sourceIdentifier": "cve@mitre.org",
"published": "1997-01-01T05:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ScriptAlias directory in NCSA and Apache httpd allowed attackers to read CGI programs."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0",
"matchCriteriaId": "9A453C77-BCCD-4BE2-BE55-FE5E21F9EEBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:illinois:ncsa_httpd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D345E6D-976C-4D9C-8BF5-E4D41983A548"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0236",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0236",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
},
"cvss": 7.5,
"severity": "HIGH",
"description": "ScriptAlias directory in NCSA and Apache httpd allowed attackers to read CGI programs."
}
},
"CVE-1999-0071": {
"cached_at": "2026-04-25T01:23:09.701692+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-1999-0071",
"sourceIdentifier": "cve@mitre.org",
"published": "1997-09-01T04:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache httpd cookie buffer overflow for versions 1.1.1 and earlier."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4363C07C-179B-4797-947F-7440AD1F2D00"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0071",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0071",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Apache httpd cookie buffer overflow for versions 1.1.1 and earlier."
}
},
"CVE-1999-0107": {
"cached_at": "2026-04-25T01:23:10.560669+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-1999-0107",
"sourceIdentifier": "cve@mitre.org",
"published": "1997-12-30T05:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Apache 1.2.5 and earlier allows a remote attacker to cause a denial of service with a large number of GET requests containing a large number of / characters."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:0.8.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E80E240C-9879-48EC-AC9A-2C1FD5E2DD8E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:0.8.14:*:*:*:*:*:*:*",
"matchCriteriaId": "AF16AF7D-9475-435F-AE36-F16CE8F45A75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "06F3141B-2C30-4230-A425-465E235539EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D2C9EA-1241-4DE6-A6CD-FCD7EEC9B42D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B5EA86B9-4F86-4ADA-BC6A-4F6E261848F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CA6523AC-ECC9-4A79-9387-18308FCF9A68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BDCBCF0F-63FB-4A03-92F8-FF121083CD85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4363C07C-179B-4797-947F-7440AD1F2D00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AB26F3B0-04F8-43C1-9136-B85932F1C2F1"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0107",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0107",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Buffer overflow in Apache 1.2.5 and earlier allows a remote attacker to cause a denial of service with a large number of GET requests containing a large number of / characters."
}
},
"CVE-1999-1199": {
"cached_at": "2026-04-25T01:23:11.492961+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-1999-1199",
"sourceIdentifier": "cve@mitre.org",
"published": "1998-08-07T04:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the \"sioux\" vulnerability."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.3.1",
"matchCriteriaId": "2CC36A25-1E07-49F0-9725-3F72EAEE6CAF"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=90252779826784&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=90276683825862&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=90280517007869&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=90286768232093&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
"source": "cve@mitre.org"
},
{
"url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
},
{
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
},
{
"url": "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
},
{
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=90252779826784&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://marc.info/?l=bugtraq&m=90276683825862&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://marc.info/?l=bugtraq&m=90280517007869&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://marc.info/?l=bugtraq&m=90286768232093&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
],
"vendorComments": [
{
"organization": "Apache",
"comment": "Fixed in Apache HTTP Server 1.3.2:\nhttp://httpd.apache.org/security/vulnerabilities_13.html",
"lastModified": "2008-07-02T00:00:00"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Apache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the \"sioux\" vulnerability."
}
},
"CVE-1999-0448": {
"cached_at": "2026-03-26T15:48:49.389350+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-1999-0448",
"sourceIdentifier": "cve@mitre.org",
"published": "1999-01-01T05:00:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D47E9C4-5439-4A82-BBD8-D6B482B47E51"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request."
}
},
"CVE-1999-0678": {
"cached_at": "2026-04-25T01:23:12.545217+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-1999-0678",
"sourceIdentifier": "cve@mitre.org",
"published": "1999-01-17T05:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D623D8C0-65D2-4269-A1D4-5CB3899F44C8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C67BDA1-9451-4026-AC6D-E912C882A757"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/318",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/318",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server."
}
},
"CVE-1999-1412": {
"cached_at": "2026-04-25T01:23:13.497796+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-1999-1412",
"sourceIdentifier": "cve@mitre.org",
"published": "1999-06-03T04:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A possible interaction between Apple MacOS X release 1.0 and Apache HTTP server allows remote attackers to cause a denial of service (crash) via a flood of HTTP GET requests to CGI programs, which generates a large number of processes."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D623D8C0-65D2-4269-A1D4-5CB3899F44C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51575CB1-A800-410A-BE8C-028FFD938245"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/archive/1/14215",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/306",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/14215",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/306",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "A possible interaction between Apple MacOS X release 1.0 and Apache HTTP server allows remote attackers to cause a denial of service (crash) via a flood of HTTP GET requests to CGI programs, which generates a large number of processes."
}
},
"CVE-1999-1237": {
"cached_at": "2026-04-25T01:23:14.590607+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-1999-1237",
"sourceIdentifier": "cve@mitre.org",
"published": "1999-06-06T04:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in smbvalid/smbval SMB authentication library, as used in Apache::AuthenSmb and possibly other modules, allows remote attackers to execute arbitrary commands via (1) a long username, (2) a long password, and (3) other unspecified methods."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D623D8C0-65D2-4269-A1D4-5CB3899F44C8"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/archive/1/14384",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2272",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/14384",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2272",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Multiple buffer overflows in smbvalid/smbval SMB authentication library, as used in Apache::AuthenSmb and possibly other modules, allows remote attackers to execute arbitrary commands via (1) a long username, (2) a long password, and (3) other unspecified methods."
}
},
"CVE-2000-1206": {
"cached_at": "2026-04-25T01:23:15.626613+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2000-1206",
"sourceIdentifier": "cve@mitre.org",
"published": "1999-08-20T04:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in Apache httpd before 1.3.11, when configured for mass virtual hosting using mod_rewrite, or mod_vhost_alias in Apache 1.3.9, allows remote attackers to retrieve arbitrary files."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "19C8989C-D8A6-4AE9-99B6-F2DAE5999EB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F715F8CB-A473-4374-8CF1-E9D74EBA5E8F"
}
]
}
]
}
],
"references": [
{
"url": "http://www.apacheweek.com/issues/00-01-07#status",
"source": "cve@mitre.org"
},
{
"url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
},
{
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
},
{
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
},
{
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
},
{
"url": "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
},
{
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
},
{
"url": "http://www.apacheweek.com/issues/00-01-07#status",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
],
"vendorComments": [
{
"organization": "Apache",
"comment": "Fixed in Apache HTTP Server 1.3.11:\nhttp://httpd.apache.org/security/vulnerabilities_13.html",
"lastModified": "2008-07-02T00:00:00"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Vulnerability in Apache httpd before 1.3.11, when configured for mass virtual hosting using mod_rewrite, or mod_vhost_alias in Apache 1.3.9, allows remote attackers to retrieve arbitrary files."
}
},
"CVE-1999-0926": {
"cached_at": "2026-04-25T01:23:16.806207+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-1999-0926",
"sourceIdentifier": "cve@mitre.org",
"published": "1999-09-03T04:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache allows remote attackers to conduct a denial of service via a large number of MIME headers."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AB26F3B0-04F8-43C1-9136-B85932F1C2F1"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/1998_3/0742.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/1998_3/0742.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Apache allows remote attackers to conduct a denial of service via a large number of MIME headers."
}
},
"CVE-1999-0454": {
"cached_at": "2026-03-26T15:48:56.455187+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-1999-0454",
"sourceIdentifier": "cve@mitre.org",
"published": "1999-01-01T05:00:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso."
}
},
"CVE-2002-0956": {
"cached_at": "2026-03-26T15:48:57.495942+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2002-0956",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-10-04T04:00:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BlackICE Agent 3.1.eal does not always reactivate after a system standby, which could allow remote attackers and local users to bypass intended firewall restrictions."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:iss:blackice_agent:3.1eal:*:*:*:*:*:*:*",
"matchCriteriaId": "C4B3C750-334F-4BF8-82F0-27C8FD7D932D"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0090.html",
"source": "cve@mitre.org"
},
{
"url": "http://online.securityfocus.com/archive/1/275710",
"source": "cve@mitre.org"
},
{
"url": "http://www.iss.net/security_center/static/9275.php",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/4950",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0090.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://online.securityfocus.com/archive/1/275710",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.iss.net/security_center/static/9275.php",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/4950",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "BlackICE Agent 3.1.eal does not always reactivate after a system standby, which could allow remote attackers and local users to bypass intended firewall restrictions."
}
},
"CVE-2006-4073": {
"cached_at": "2026-03-26T15:48:58.464383+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2006-4073",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-08-11T01:04:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple PHP remote file inclusion vulnerabilities in Fabian Hainz phpCC Beta 4.2 allow remote attackers to execute arbitrary PHP code via a URL in the base_dir parameter to (1) login.php, (2) reactivate.php, or (3) register.php."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de archivo en PHP en Fabian Hainz phpCC Beta 4.2 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en el par\u00e1metro base_dir a (1) login.php, (2) reactivate.php, o (3) register.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpcc:phpcc:beta_4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "973B60E8-FC41-41E0-97B4-0E945BE3A994"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/archive/1/442428/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/19376",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.solpotcrew.org/adv/solpot-adv-05.txt",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/3199",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28259",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/2134",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/442428/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/19376",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.solpotcrew.org/adv/solpot-adv-05.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2006/3199",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28259",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.exploit-db.com/exploits/2134",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Multiple PHP remote file inclusion vulnerabilities in Fabian Hainz phpCC Beta 4.2 allow remote attackers to execute arbitrary PHP code via a URL in the base_dir parameter to (1) login.php, (2) reactivate.php, or (3) register.php."
}
},
"CVE-2007-1724": {
"cached_at": "2026-03-26T15:48:59.412932+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2007-1724",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-03-28T00:19:00.000",
"lastModified": "2025-04-09T00:30:58.490",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in ReactOS 0.3.1 has unknown impact and attack vectors, related to a fix for \"dozens of win32k bugs and failures,\" in which the fix itself introduces a vulnerability, possibly related to user-mode and kernel-mode copy failures."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en ReactOS 0.3.1 tiene impacto y vectores de ataque desconocidos, relacionados con un parche para \"docenas de fallos y errores win32k\", en el que el propio parche reintroduce una vulnerabilidad, posiblemente relacionada con fallos de copia en user-mode y kernel-mode."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:reactos:reactos:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C581336D-F572-469A-B9F4-B71D6E9D5758"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/43446",
"source": "cve@mitre.org"
},
{
"url": "http://www.reactos.org/wiki/index.php/ChangeLog-0.3.1",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/43446",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.reactos.org/wiki/index.php/ChangeLog-0.3.1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Unspecified vulnerability in ReactOS 0.3.1 has unknown impact and attack vectors, related to a fix for \"dozens of win32k bugs and failures,\" in which the fix itself introduces a vulnerability, possibly related to user-mode and kernel-mode copy failures."
}
},
"CVE-2007-4244": {
"cached_at": "2026-03-26T15:49:00.339979+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2007-4244",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-08-08T23:17:00.000",
"lastModified": "2025-04-09T00:30:58.490",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHP remote file inclusion vulnerability in langset.php in J! Reactions (com_jreactions) 1.8.1 and earlier, a Joomla! component, allows remote attackers to execute arbitrary PHP code via a URL in the comPath parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de inclusi\u00f3n remota de archivos PHP en el archivo langset.php en J! Reactions (com_jreactions) versiones 1.8.1 y anteriores, un componente de Joomla!, permite a atacantes remotos ejecutar c\u00f3digo PHP arbitrario por medio de una URL en el par\u00e1metro comPath."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:j_reactions:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.8.1",
"matchCriteriaId": "A18B10EB-8B7B-4BF9-AC61-ED1CDDC13102"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/2984",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/475544/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/477144/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/477245/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/25198",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://yollubunlar.org/joomla-j-reactions-component-rfi-75.html",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35808",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/2984",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/475544/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/477144/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/477245/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/25198",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://yollubunlar.org/joomla-j-reactions-component-rfi-75.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35808",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "PHP remote file inclusion vulnerability in langset.php in J! Reactions (com_jreactions) 1.8.1 and earlier, a Joomla! component, allows remote attackers to execute arbitrary PHP code via a URL in the comPath parameter."
}
},
"CVE-2007-4844": {
"cached_at": "2026-03-26T15:49:01.212576+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2007-4844",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-09-12T20:17:00.000",
"lastModified": "2025-04-09T00:30:58.490",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "X-Diesel Unreal Commander 0.92 build 565 and 573 does not properly react to an FTP server's behavior after sending a \"CWD /\" command, which allows remote FTP servers to cause a denial of service (infinite loop) by (1) repeatedly sending a 550 error response, or (2) sending a 550 error response and then disconnecting."
},
{
"lang": "es",
"value": "X-Diesel Unreal Commander 0.92 build 565 y 573 no reacciona adecuadamente al comportamiento de un servidor FTP tras enviar un comando \"CWD /\", lo cual permite a servidores FTP remotos provocar una denegaci\u00f3n de servicio (bucle infinito) (1) enviando repetidamente una respuesta de error 550, o (2) enviando una respuesta de error 550 y despu\u00e9s desconectando."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x-diesel:unreal_commander:0.92_build565:*:*:*:*:*:*:*",
"matchCriteriaId": "5E10A135-3DEA-4C76-8BDA-28252FE266E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x-diesel:unreal_commander:0.92_build573:*:*:*:*:*:*:*",
"matchCriteriaId": "A38B09DC-7E74-49EE-AA19-E9A542932AEF"
}
]
}
]
}
],
"references": [
{
"url": "http://blog.hispasec.com/lab/advisories/adv_UnrealCommander_0_92_build_573_Multiple_FTP_Based_Vulnerabilities.txt",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/39616",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/3125",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/478728/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/25583",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36488",
"source": "cve@mitre.org"
},
{
"url": "http://blog.hispasec.com/lab/advisories/adv_UnrealCommander_0_92_build_573_Multiple_FTP_Based_Vulnerabilities.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://osvdb.org/39616",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securityreason.com/securityalert/3125",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/478728/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/25583",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36488",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "X-Diesel Unreal Commander 0.92 build 565 and 573 does not properly react to an FTP server's behavior after sending a \"CWD /\" command, which allows remote FTP servers to cause a denial of service (infinite loop) by (1) repeatedly sending a 550 error response, or (2) sending a 550 error response and then disconnecting."
}
},
"CVE-2017-7916": {
"cached_at": "2026-03-26T15:49:02.162890+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2017-7916",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2017-08-07T08:29:00.197",
"lastModified": "2025-04-20T01:37:25.860",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Permissions, Privileges, and Access Controls issue was discovered in ABB VSN300 WiFi Logger Card versions 1.8.15 and prior, and VSN300 WiFi Logger Card for React versions 2.1.3 and prior. The web application does not properly restrict privileges of the Guest account. A malicious user may be able to gain access to configuration information that should be restricted."
},
{
"lang": "es",
"value": "Se ha descubierto un problema de control de permisos, privilegios y accesos en ABB VSN300 WiFi Logger Card versiones 1.8.15 y anteriores, y VSN300 WiFi Logger Card for React versiones 2.1.3 y anteriores. La aplicaci\u00f3n web no restringe privilegios de la cuenta de invitado correctamente. Un usuario malicioso podr\u00eda ser capaz de conseguir acceso a informaci\u00f3n de configuraci\u00f3n que deber\u00eda estar restringida."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:vsn300_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.8.15",
"matchCriteriaId": "55CE1554-02F3-48C7-9358-5BFAE8C73088"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:vsn300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "440423E1-CF52-4E64-9FFF-BA00636DAB57"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:vsn300_for_react_firmware:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7A99018B-9729-45B8-8E1C-1A3940329897"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:vsn300_for_react:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A14628BB-774D-436E-A2DF-C9CC66A1D3CE"
}
]
}
]
}
],
"references": [
{
"url": "http://search.abb.com/library/Download.aspx?DocumentID=9AKK107045A1977&LanguageCode=en&DocumentPartId=&Action=Launch",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/99558",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-192-03",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://search.abb.com/library/Download.aspx?DocumentID=9AKK107045A1977&LanguageCode=en&DocumentPartId=&Action=Launch",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/99558",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-192-03",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
},
"cvss": 6.5,
"severity": "MEDIUM",
"description": "A Permissions, Privileges, and Access Controls issue was discovered in ABB VSN300 WiFi Logger Card versions 1.8.15 and prior, and VSN300 WiFi Logger Card for React versions 2.1.3 and prior. The web application does not properly restrict privileges of the Guest account. A malicious user may be able to gain access to configuration information that should be restricted."
}
},
"CVE-2017-7920": {
"cached_at": "2026-03-26T15:49:03.241287+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2017-7920",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2017-08-07T08:29:00.243",
"lastModified": "2025-04-20T01:37:25.860",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Authentication issue was discovered in ABB VSN300 WiFi Logger Card versions 1.8.15 and prior, and VSN300 WiFi Logger Card for React versions 2.1.3 and prior. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access internal information about status and connected devices without authenticating."
},
{
"lang": "es",
"value": "Se ha descubierto un problema de autenticaci\u00f3n incorrecta en ABB VSN300 WiFi Logger Card versiones 1.8.15 y anteriores, y VSN300 WiFi Logger Card for React versiones 2.1.3 y anteriores. Al acceder a una URL concreta en el servidor web, un usuario malicioso es capaz de acceder a informaci\u00f3n interna acerca del estado y los dispositivos conectados sin autenticarse."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:vsn300_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.8.15",
"matchCriteriaId": "55CE1554-02F3-48C7-9358-5BFAE8C73088"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:vsn300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "440423E1-CF52-4E64-9FFF-BA00636DAB57"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:vsn300_for_react_firmware:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7A99018B-9729-45B8-8E1C-1A3940329897"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:vsn300_for_react:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A14628BB-774D-436E-A2DF-C9CC66A1D3CE"
}
]
}
]
}
],
"references": [
{
"url": "http://search.abb.com/library/Download.aspx?DocumentID=9AKK107045A1977&LanguageCode=en&DocumentPartId=&Action=Launch",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/99558",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-192-03",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://search.abb.com/library/Download.aspx?DocumentID=9AKK107045A1977&LanguageCode=en&DocumentPartId=&Action=Launch",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/99558",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-192-03",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
},
"cvss": 7.5,
"severity": "HIGH",
"description": "An Improper Authentication issue was discovered in ABB VSN300 WiFi Logger Card versions 1.8.15 and prior, and VSN300 WiFi Logger Card for React versions 2.1.3 and prior. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access internal information about status and connected devices without authenticating."
}
},
"CVE-2017-1000386": {
"cached_at": "2026-03-26T15:49:04.273280+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2017-1000386",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-01-26T02:29:00.267",
"lastModified": "2024-11-21T03:04:36.670",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jenkins Active Choices plugin version 1.5.3 and earlier allowed users with Job/Configure permission to provide arbitrary HTML to be shown on the 'Build With Parameters' page through the 'Active Choices Reactive Reference Parameter' type. This could include, for example, arbitrary JavaScript. Active Choices now sanitizes the HTML inserted on the 'Build With Parameters' page if and only if the script is executed in a sandbox. As unsandboxed scripts are subject to administrator approval, it is up to the administrator to allow or disallow problematic script output."
},
{
"lang": "es",
"value": "El plugin Jenkins Active Choices en versiones 1.5.3 y anteriores permit\u00eda que usuarios con el permiso Job/Configure proporcionasen HTML arbitrarios para que se mostrase en la p\u00e1gina \"Build With Parameters\" a trav\u00e9s del tipo \"Active Choices Reactive Reference Parameter\". Esto podr\u00eda incluir, por ejemplo, JavaScript arbitrario. Ahora, Active Choices sanea el HTML insertado en la p\u00e1gina \"Build With Parameters\" solo si el script se ejecuta en un sandbox. Como los scripts que no se ejecutan en sandbox est\u00e1n sujetos a la aprobaci\u00f3n del administrador, son estos usuarios los que deciden si permitir o no el env\u00edo de scripts problem\u00e1ticos."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"baseScore": 3.5,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:active_choices:*:*:*:*:*:jenkins:*:*",
"versionEndIncluding": "1.5.2",
"matchCriteriaId": "FF04CE1B-11E0-4AED-915E-AD009D611E38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:active_choices:1.5.3:-:*:*:*:*:*:*",
"matchCriteriaId": "06243B6F-3511-4AF2-AA93-C03DA6DCA5C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:active_choices:1.5.3:alpha:*:*:*:jenkins:*:*",
"matchCriteriaId": "D4EDB876-32B4-4A2B-BB4B-DA098FB2D5D4"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/101538",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://jenkins.io/security/advisory/2017-10-23/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/101538",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://jenkins.io/security/advisory/2017-10-23/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
},
"cvss": 5.4,
"severity": "MEDIUM",
"description": "Jenkins Active Choices plugin version 1.5.3 and earlier allowed users with Job/Configure permission to provide arbitrary HTML to be shown on the 'Build With Parameters' page through the 'Active Choices Reactive Reference Parameter' type. This could include, for example, arbitrary JavaScript. Active Choices now sanitizes the HTML inserted on the 'Build With Parameters' page if and only if the script is executed in a sandbox. As unsandboxed scripts are subject to administrator approval, it is up t"
}
},
"CVE-2018-7197": {
"cached_at": "2026-03-26T15:49:05.398230+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2018-7197",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-02-18T03:29:00.243",
"lastModified": "2024-11-21T04:11:46.403",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Pluck through 4.7.4. A stored cross-site scripting (XSS) vulnerability allows remote unauthenticated users to inject arbitrary web script or HTML into admin/blog Reaction Comments via a crafted URL."
},
{
"lang": "es",
"value": "Se ha descubierto un problema hasta la versi\u00f3n 4.7.4 de Pluck. Una vulnerabilidad de Cross-Site Scripting (XSS) persistente permite que usuarios remotos no autenticados inyecten scripts web o HTML arbitrarios en comentarios de reacci\u00f3n en admin/blog mediante una URL manipulada."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pluck-cms:pluck:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.7.4",
"matchCriteriaId": "291F9561-FF87-4867-9C68-19FA59C5F3B4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/pluck-cms/pluck/issues/47",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/pluck-cms/pluck/issues/47",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
},
"cvss": 6.1,
"severity": "MEDIUM",
"description": "An issue was discovered in Pluck through 4.7.4. A stored cross-site scripting (XSS) vulnerability allows remote unauthenticated users to inject arbitrary web script or HTML into admin/blog Reaction Comments via a crafted URL."
}
},
"CVE-2004-1812": {
"cached_at": "2026-03-26T15:49:07.642285+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2004-1812",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-12-31T05:00:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in Agent Common Services (1) cam.exe and (2) awservices.exe in Unicenter TNG 2.4 allow remote attackers to execute arbitrary code."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D2C5704D-3337-4351-872B-AF987DC39BC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFF2305-24CF-48F7-841E-63400CF25B48"
}
]
}
]
}
],
"references": [
{
"url": "ftp://ftp.ca.com/CAproducts/unicenter/CCS31/nt/qi52764/QI52764.DB0",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=107936784030214&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/11131",
"source": "cve@mitre.org"
},
{
"url": "http://www.derkeiler.com/Mailing-Lists/VulnWatch/2004-03/0008.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.immunitysec.com/downloads/awservices.sxw.pdf",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/9863",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15472",
"source": "cve@mitre.org"
},
{
"url": "ftp://ftp.ca.com/CAproducts/unicenter/CCS31/nt/qi52764/QI52764.DB0",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=107936784030214&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/11131",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.derkeiler.com/Mailing-Lists/VulnWatch/2004-03/0008.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.immunitysec.com/downloads/awservices.sxw.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/9863",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15472",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Multiple stack-based buffer overflows in Agent Common Services (1) cam.exe and (2) awservices.exe in Unicenter TNG 2.4 allow remote attackers to execute arbitrary code."
}
},
"CVE-2004-2138": {
"cached_at": "2026-03-26T15:49:08.502546+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2004-2138",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-12-31T05:00:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in AWSguest.php in AllWebScripts MySQLGuest allows remote attackers to inject arbitrary HTML and PHP code via the (1) Name, (2) Email, (3) Homepage or (4) Comments field."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:allwebscripts:mysqlguest:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0DFFA849-219B-4649-B78E-47659C0CBB54"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1011376",
"source": "cve@mitre.org"
},
{
"url": "http://www.computerknights.org/forum_viewtopic.php?2.122",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"URL Repurposed"
]
},
{
"url": "http://www.securityfocus.com/bid/11234",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17462",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1011376",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.computerknights.org/forum_viewtopic.php?2.122",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"URL Repurposed"
]
},
{
"url": "http://www.securityfocus.com/bid/11234",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17462",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Cross-site scripting (XSS) vulnerability in AWSguest.php in AllWebScripts MySQLGuest allows remote attackers to inject arbitrary HTML and PHP code via the (1) Name, (2) Email, (3) Homepage or (4) Comments field."
}
},
"CVE-2005-0116": {
"cached_at": "2026-03-26T15:49:09.521885+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2005-0116",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-01-18T05:00:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.3",
"matchCriteriaId": "64A662D9-1187-489B-8E44-A409FFC808A6"
}
]
}
]
}
],
"references": [
{
"url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/13893/",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities&flashstatus=false",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/272296",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.osvdb.org/13002",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/12298",
"source": "cve@mitre.org"
},
{
"url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/13893/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities&flashstatus=false",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/272296",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.osvdb.org/13002",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/12298",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl."
}
},
"CVE-2005-0362": {
"cached_at": "2026-03-26T15:49:10.363069+00:00",
"data": {
"verified": false,
"data": null,
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "CVE not found in NVD database"
}
},
"CVE-2005-0363": {
"cached_at": "2026-03-26T15:49:11.349907+00:00",
"data": {
"verified": false,
"data": null,
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "CVE not found in NVD database"
}
},
"CVE-2005-0435": {
"cached_at": "2026-03-26T15:49:12.447583+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2005-0435",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-05-02T04:00:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to read server web logs by setting the loadplugin and pluginmode parameters to rawlog."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/14299",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/390368",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19333",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/14299",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/390368",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19333",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to read server web logs by setting the loadplugin and pluginmode parameters to rawlog."
}
},
"CVE-2005-0436": {
"cached_at": "2026-03-26T15:49:13.363911+00:00",
"data": {
"verified": false,
"data": null,
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "CVE not found in NVD database"
}
},
"CVE-2005-0437": {
"cached_at": "2026-03-26T15:49:14.253044+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2005-0437",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-05-02T04:00:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to include arbitrary Perl modules via .. (dot dot) sequences in the loadplugin parameter."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/14299",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/390368",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/14299",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/390368",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Directory traversal vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to include arbitrary Perl modules via .. (dot dot) sequences in the loadplugin parameter."
}
},
"CVE-2005-0438": {
"cached_at": "2026-03-26T15:49:15.121451+00:00",
"data": {
"verified": false,
"data": null,
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "CVE not found in NVD database"
}
},
"CVE-2005-1527": {
"cached_at": "2026-03-26T15:49:16.033614+00:00",
"data": {
"verified": false,
"data": null,
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "CVE not found in NVD database"
}
},
"CVE-2020-36363": {
"cached_at": "2026-04-06T11:23:38.873825+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2020-36363",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-08-12T22:15:07.640",
"lastModified": "2024-11-21T05:29:18.963",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Amazon AWS CloudFront TLSv1.2_2019 allows TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 and TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, which some entities consider to be weak ciphers."
},
{
"lang": "es",
"value": "Amazon AWS CloudFront versi\u00f3n TLSv1.2_2019, permite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 y TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, que algunas entidades consideran cifrados d\u00e9biles."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amazon:amazon_cloudfront:1.2_2019:*:*:*:*:*:*:*",
"matchCriteriaId": "68F2AFC4-75CF-41C1-8A2E-7CC659E22969"
}
]
}
]
}
],
"references": [
{
"url": "https://aws.amazon.com/about-aws/whats-new/2020/07/cloudfront-tls-security-policy/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://stackoverflow.com/questions/62071604",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://aws.amazon.com/about-aws/whats-new/2020/07/cloudfront-tls-security-policy/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://stackoverflow.com/questions/62071604",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
},
"cvss": 9.8,
"severity": "CRITICAL",
"description": "Amazon AWS CloudFront TLSv1.2_2019 allows TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 and TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, which some entities consider to be weak ciphers."
}
},
"CVE-2025-57682": {
"cached_at": "2026-04-06T11:23:40.003087+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-2025-57682",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-09-22T16:15:45.837",
"lastModified": "2025-10-14T19:56:26.170",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory Traversal vulnerability in Papermark 0.20.0 and prior allows authenticated attackers to retrieve arbitrary files from an S3 bucket through its CloudFront distribution via the \"POST /api/file/s3/get-presigned-get-url-proxy\" API"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:papermark:papermark:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.20.0",
"matchCriteriaId": "B65047BA-7158-4377-A7EF-36251ECA94B7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dos-m0nk3y/CVE/tree/main/CVE-2025-57682",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/mfts/papermark",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://papermark.com/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
},
"cvss": 6.5,
"severity": "MEDIUM",
"description": "Directory Traversal vulnerability in Papermark 0.20.0 and prior allows authenticated attackers to retrieve arbitrary files from an S3 bucket through its CloudFront distribution via the \"POST /api/file/s3/get-presigned-get-url-proxy\" API"
}
},
"CVE-1999-1015": {
"cached_at": "2026-04-07T23:20:17.168207+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-1999-1015",
"sourceIdentifier": "cve@mitre.org",
"published": "1998-04-08T04:00:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Apple AppleShare Mail Server 5.0.3 on MacOS 8.1 and earlier allows a remote attacker to cause a denial of service (crash) via a long HELO command."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:appleshare_mail_server:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB5CA34-6F8B-42A8-9E2A-C13C648ED379"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=89200657216213&w=2",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=89200657216213&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Buffer overflow in Apple AppleShare Mail Server 5.0.3 on MacOS 8.1 and earlier allows a remote attacker to cause a denial of service (crash) via a long HELO command."
}
},
"CVE-1999-1393": {
"cached_at": "2026-04-07T23:20:17.845604+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-1999-1393",
"sourceIdentifier": "cve@mitre.org",
"published": "1999-05-21T04:00:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Control Panel \"Password Security\" option for Apple Powerbooks allows attackers with physical access to the machine to bypass the security by booting it with an emergency startup disk and using a disk editor to modify the on/off toggle or password in the aaaaaaaAPWD file, which is normally inaccessible."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 4.6,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B228B2A1-8897-4028-9744-B30021CC6ECB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD596AD-EBF4-4A02-88E2-54952FD19E09"
}
]
}
]
}
],
"references": [
{
"url": "http://freaky.staticusers.net/macsec/data/powerbooksecurity-data.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/532",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://freaky.staticusers.net/macsec/data/powerbooksecurity-data.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/532",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "Control Panel \"Password Security\" option for Apple Powerbooks allows attackers with physical access to the machine to bypass the security by booting it with an emergency startup disk and using a disk editor to modify the on/off toggle or password in the aaaaaaaAPWD file, which is normally inaccessible."
}
},
"CVE-1999-0561": {
"cached_at": "2026-04-25T01:44:20.786469+00:00",
"data": {
"verified": true,
"data": {
"id": "CVE-1999-0561",
"sourceIdentifier": "cve@mitre.org",
"published": "1999-01-01T05:00:00.000",
"lastModified": "2026-04-16T00:27:16.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IIS has the #exec function enabled for Server Side Include (SSI) files."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"references": [
{
"url": "https://www.cve.org/CVERecord?id=CVE-1999-0561",
"source": "cve@mitre.org"
},
{
"url": "https://www.cve.org/CVERecord?id=CVE-1999-0561",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
},
"cvss": 0.0,
"severity": "UNKNOWN",
"description": "IIS has the #exec function enabled for Server Side Include (SSI) files."
}
}
}