{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T01:44:35.178","vulnerabilities":[{"cve":{"id":"CVE-2012-4551","sourceIdentifier":"secalert@redhat.com","published":"2012-11-30T22:55:01.550","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Use-after-free vulnerability in libunity-webapps before 2.4.1 allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted web site, related to \"certain hash tables.\""},{"lang":"es","value":"Vulnerabilidad de uso después de liberación en libunity-webapps antes de v2.4.1 permite a atacantes remotos provocar una denegación de servicio (corrupción de memoria y caída) y posiblemente ejecutar código arbitrario a través de un sitio web modificado, en relación con \"ciertas tablas hash\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-399"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:*:*:*:*:*:*:*:*","versionEndIncluding":"2.4.0","matchCriteriaId":"47B7CFBA-31C8-470E-A18A-880B52EF5DA4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:0.02:*:*:*:*:*:*:*","matchCriteriaId":"D1F49165-80B8-4151-B0E5-51B6ED8E032F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:0.2.1:*:*:*:*:*:*:*","matchCriteriaId":"130CB642-21AC-4929-847F-76D9B917F368"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:0.3:*:*:*:*:*:*:*","matchCriteriaId":"0A771A13-5749-4C37-9190-A6CD15C3B6CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:0.3.1:*:*:*:*:*:*:*","matchCriteriaId":"B593C75D-0356-4F8E-9EDB-47C007B20F41"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:2.0:*:*:*:*:*:*:*","matchCriteriaId":"A00C2101-E822-4725-AC15-B87B04C8BAC1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"742A65FE-13E4-4419-B6D8-156DC1AB71FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:2.1:*:*:*:*:*:*:*","matchCriteriaId":"CFC5700D-2526-4E83-AC15-B63B2B0A5DE2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3:*:*:*:*:*:*:*","matchCriteriaId":"93465EAA-55D2-40A7-8639-DFA0B855B980"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.1:*:*:*:*:*:*:*","matchCriteriaId":"A65D340A-9B8B-4694-88DC-A7BFA905548E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.2:*:*:*:*:*:*:*","matchCriteriaId":"7D124800-C155-4F84-A115-970BD0CB2E7A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.3:*:*:*:*:*:*:*","matchCriteriaId":"D1440637-2425-493E-AE9D-226615B2B384"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.4:*:*:*:*:*:*:*","matchCriteriaId":"B1D3DCFB-8285-4C7D-B2D8-FEA1FED0B4DC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.5:*:*:*:*:*:*:*","matchCriteriaId":"FEAA1725-7671-4A2A-B99D-86ECEF4D1D43"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.6:*:*:*:*:*:*:*","matchCriteriaId":"2A5DA396-498F-4EA2-A133-B86FB3C5F1A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.7:*:*:*:*:*:*:*","matchCriteriaId":"0B9C812E-A01F-4683-BF1F-56BBBC236982"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.8:*:*:*:*:*:*:*","matchCriteriaId":"1FA0DA0F-25F9-4CEA-B11C-AE26581E9E5F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.9:*:*:*:*:*:*:*","matchCriteriaId":"C2075FD1-E2E5-4C69-87DA-EFA5E0907309"}]}]}],"references":[{"url":"http://bazaar.launchpad.net/~webapps/libunity-webapps/trunk/revision/815","source":"secalert@redhat.com"},{"url":"http://www.openwall.com/lists/oss-security/2012/10/29/3","source":"secalert@redhat.com"},{"url":"http://www.securityfocus.com/bid/56314","source":"secalert@redhat.com"},{"url":"http://www.ubuntu.com/usn/USN-1635-1","source":"secalert@redhat.com"},{"url":"https://bugs.launchpad.net/ubuntu/%2Bsource/libunity-webapps/%2Bbug/1068495","source":"secalert@redhat.com"},{"url":"http://bazaar.launchpad.net/~webapps/libunity-webapps/trunk/revision/815","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2012/10/29/3","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/56314","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ubuntu.com/usn/USN-1635-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugs.launchpad.net/ubuntu/%2Bsource/libunity-webapps/%2Bbug/1068495","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}