| Furɗe | Gargadi 1/5 02/07/2023 15:04 | Gargadi 2/5 02/07/2023 15:06 | Gargadi 3/5 02/07/2023 15:12 | Gargadi 4/5 08/06/2024 11:40 | Gargadi 5/5 04/28/2025 06:42 |
|---|
| software_vendor | calesanz | calesanz | calesanz | calesanz | calesanz |
| software_name | gibb-modul-151 | gibb-modul-151 | gibb-modul-151 | gibb-modul-151 | gibb-modul-151 |
| software_function | bearbeiten/login | bearbeiten/login | bearbeiten/login | bearbeiten/login | bearbeiten/login |
| vulnerability_cwe | CWE-601 (Redirect) | CWE-601 (Redirect) | CWE-601 (Redirect) | CWE-601 (Redirect) | CWE-601 (Redirect) |
| vulnerability_risk | 1 | 1 | 1 | 1 | 1 |
| cvss3_vuldb_av | N | N | N | N | N |
| cvss3_vuldb_ac | L | L | L | L | L |
| cvss3_vuldb_ui | R | R | R | R | R |
| cvss3_vuldb_s | U | U | U | U | U |
| cvss3_vuldb_c | N | N | N | N | N |
| cvss3_vuldb_i | L | L | L | L | L |
| cvss3_vuldb_a | L | L | L | L | L |
| cvss3_vuldb_rl | O | O | O | O | O |
| cvss3_vuldb_rc | C | C | C | C | C |
| advisory_identifier | 88a517dc19443081210c804b655e72770727540d | 88a517dc19443081210c804b655e72770727540d | 88a517dc19443081210c804b655e72770727540d | 88a517dc19443081210c804b655e72770727540d | 88a517dc19443081210c804b655e72770727540d |
| advisory_url | https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d | https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d | https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d | https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d | https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d |
| countermeasure_name | Kari | Kari | Kari | Kari | Kari |
| patch_name | 88a517dc19443081210c804b655e72770727540d | 88a517dc19443081210c804b655e72770727540d | 88a517dc19443081210c804b655e72770727540d | 88a517dc19443081210c804b655e72770727540d | 88a517dc19443081210c804b655e72770727540d |
| countermeasure_patch_url | https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d | https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d | https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d | https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d | https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d |
| countermeasure_advisoryquote | fixed security vulnerability in redirect (missing validation) | fixed security vulnerability in redirect (missing validation) | fixed security vulnerability in redirect (missing validation) | fixed security vulnerability in redirect (missing validation) | fixed security vulnerability in redirect (missing validation) |
| source_cve | CVE-2015-10052 | CVE-2015-10052 | CVE-2015-10052 | CVE-2015-10052 | CVE-2015-10052 |
| cna_responsible | VulDB | VulDB | VulDB | VulDB | VulDB |
| cna_eol | 1 | 1 | 1 | 1 | 1 |
| advisory_date | 1673650800 (01/14/2023) | 1673650800 (01/14/2023) | 1673650800 (01/14/2023) | 1673650800 (01/14/2023) | 1673650800 (01/14/2023) |
| cvss2_vuldb_av | N | N | N | N | N |
| cvss2_vuldb_ac | L | L | L | L | L |
| cvss2_vuldb_ci | N | N | N | N | N |
| cvss2_vuldb_ii | P | P | P | P | P |
| cvss2_vuldb_ai | P | P | P | P | P |
| cvss2_vuldb_rc | C | C | C | C | C |
| cvss2_vuldb_rl | OF | OF | OF | OF | OF |
| cvss2_vuldb_au | S | S | S | S | S |
| cvss2_vuldb_e | ND | ND | ND | ND | ND |
| cvss3_vuldb_pr | L | L | L | L | L |
| cvss3_vuldb_e | X | X | X | X | X |
| cvss2_vuldb_basescore | 5.5 | 5.5 | 5.5 | 5.5 | 5.5 |
| cvss2_vuldb_tempscore | 4.8 | 4.8 | 4.8 | 4.8 | 4.8 |
| cvss3_vuldb_basescore | 4.6 | 4.6 | 4.6 | 4.6 | 4.6 |
| cvss3_vuldb_tempscore | 4.4 | 4.4 | 4.4 | 4.4 | 4.4 |
| cvss3_meta_basescore | 4.6 | 5.1 | 5.1 | 5.1 | 5.1 |
| cvss3_meta_tempscore | 4.4 | 5.0 | 5.0 | 5.0 | 5.0 |
| price_0day | $0-$5k | $0-$5k | $0-$5k | $0-$5k | $0-$5k |
| cve_assigned | 1673650800 (01/14/2023) | 1673650800 (01/14/2023) | 1673650800 (01/14/2023) | 1673650800 (01/14/2023) | 1673650800 (01/14/2023) |
| cve_nvd_summary | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The name of the patch is 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The name of the patch is 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | ** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The name of the patch is 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | ** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The name of the patch is 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | ** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The name of the patch is 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. |
| cvss3_nvd_av | | N | N | N | N |
| cvss3_nvd_ac | | L | L | L | L |
| cvss3_nvd_pr | | N | N | N | N |
| cvss3_nvd_ui | | R | R | R | R |
| cvss3_nvd_s | | C | C | C | C |
| cvss3_nvd_c | | L | L | L | L |
| cvss3_nvd_i | | L | L | L | L |
| cvss3_nvd_a | | N | N | N | N |
| cvss2_nvd_av | | N | N | N | N |
| cvss2_nvd_ac | | L | L | L | L |
| cvss2_nvd_au | | S | S | S | S |
| cvss2_nvd_ci | | N | N | N | N |
| cvss2_nvd_ii | | P | P | P | P |
| cvss2_nvd_ai | | P | P | P | P |
| cvss3_cna_av | | N | N | N | N |
| cvss3_cna_ac | | L | L | L | L |
| cvss3_cna_pr | | L | L | L | L |
| cvss3_cna_ui | | R | R | R | R |
| cvss3_cna_s | | U | U | U | U |
| cvss3_cna_c | | N | N | N | N |
| cvss3_cna_i | | L | L | L | L |
| cvss3_cna_a | | L | L | L | L |
| cve_cna | | VulDB | VulDB | VulDB | VulDB |
| cvss2_nvd_basescore | | 5.5 | 5.5 | 5.5 | 5.5 |
| cvss3_nvd_basescore | | 6.1 | 6.1 | 6.1 | 6.1 |
| cvss3_cna_basescore | | 4.6 | 4.6 | 4.6 | 4.6 |
| cve_nvd_summaryes | | | | ** NO SOPORTADO CUANDO ESTÁ ASIGNADO ** Una vulnerabilidad clasificada como problemática fue encontrada en calesanz gibb-modul-151. Esto afecta a la función Bearbeiten/login. La manipulación conduce a open redirect. Es posible iniciar el ataque de forma remota. El parche se llama 88a517dc19443081210c804b655e72770727540d. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218379. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. | ** NO SOPORTADO CUANDO ESTÁ ASIGNADO ** Una vulnerabilidad clasificada como problemática fue encontrada en calesanz gibb-modul-151. Esto afecta a la función Bearbeiten/login. La manipulación conduce a open redirect. Es posible iniciar el ataque de forma remota. El parche se llama 88a517dc19443081210c804b655e72770727540d. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218379. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. |
| cvss2_cna_av | | | | N | N |
| cvss2_cna_ac | | | | L | L |
| cvss2_cna_au | | | | S | S |
| cvss2_cna_ci | | | | N | N |
| cvss2_cna_ii | | | | P | P |
| cvss2_cna_ai | | | | P | P |
| cvss2_cna_basescore | | | | 5.5 | 5.5 |
| cvss4_vuldb_av | | | | N | N |
| cvss4_vuldb_ac | | | | L | L |
| cvss4_vuldb_pr | | | | L | L |
| cvss4_vuldb_vc | | | | N | N |
| cvss4_vuldb_vi | | | | L | L |
| cvss4_vuldb_va | | | | L | L |
| cvss4_vuldb_e | | | | X | X |
| cvss4_vuldb_at | | | | N | N |
| cvss4_vuldb_ui | | | | N | P |
| cvss4_vuldb_sc | | | | N | N |
| cvss4_vuldb_si | | | | N | N |
| cvss4_vuldb_sa | | | | N | N |
| cvss4_vuldb_bscore | | | | 5.3 | 5.1 |
| cvss4_vuldb_btscore | | | | 5.3 | 5.1 |