CVE-2013-4322

CVSS V2 Medium 4.3 CVSS V3 None
Description
Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544.
Overview
  • CVE ID
  • CVE-2013-4322
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2014-02-26T14:55:08
  • Last Modified Date
  • 2019-04-15T16:29:26
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* 1 OR 6.0.37
cpe:2.3:a:apache:tomcat:1.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.30:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.31:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.33:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.34:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.35:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:8.0.0:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:8.0.0:rc4:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:8.0.0:rc6:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:8.0.0:rc7:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:8.0.0:rc8:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:8.0.0:rc9:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
References
Reference URL Reference Tags
http://tomcat.apache.org/security-7.html Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=1521834
http://svn.apache.org/viewvc?view=revision&revision=1549523
http://svn.apache.org/viewvc?view=revision&revision=1521864
http://svn.apache.org/viewvc?view=revision&revision=1556540
http://tomcat.apache.org/security-6.html Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1069905
http://tomcat.apache.org/security-8.html Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=1549522
https://rhn.redhat.com/errata/RHSA-2014-0686.html
http://www-01.ibm.com/support/docview.wss?uid=swg21675886
http://secunia.com/advisories/59873
http://secunia.com/advisories/59036
http://secunia.com/advisories/59722
http://www-01.ibm.com/support/docview.wss?uid=swg21677147
http://www.securityfocus.com/bid/65767
http://secunia.com/advisories/59724
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://secunia.com/advisories/59675
http://www-01.ibm.com/support/docview.wss?uid=swg21667883
http://www-01.ibm.com/support/docview.wss?uid=swg21678113
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://advisories.mageia.org/MGASA-2014-0148.html
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.debian.org/security/2016/dsa-3530
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.ubuntu.com/usn/USN-2130-1
http://www.securityfocus.com/archive/1/534161/100/0/threaded
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
History
Created Old Value New Value Data Type Notes
2022-05-10 17:43:52 Added to TrackCVE
2022-12-01 21:59:36 2014-02-26T14:55Z 2014-02-26T14:55:08 CVE Published Date updated
2022-12-01 21:59:36 2019-04-15T16:29:26 CVE Modified Date updated
2022-12-01 21:59:36 Modified Vulnerability Status updated