U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2011-2487

Change History

Initial Analysis by NIST 3/18/2020 1:03:06 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:* versions from (including) 2.4.0 up to (including) 2.4.6
     *cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:* versions from (including) 2.5.0 up to (including) 2.5.2
     *cpe:2.3:a:apache:wss4j:*:*:*:*:*:*:*:* versions up to (excluding) 1.6.5
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:redhat:jboss_business_rules_management_system:5.3:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_application_platform_text-only_advisories:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_middleware_text-only_advisories:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_portal:4.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_web_services:-:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Added CWE

								
							
							
						
NIST CWE-327
Changed Reference Type
http://cxf.apache.org/note-on-cve-2011-2487.html No Types Assigned
http://cxf.apache.org/note-on-cve-2011-2487.html Vendor Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2013-0191.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2013-0191.html Patch, Vendor Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2013-0192.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2013-0192.html Patch, Vendor Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2013-0193.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2013-0193.html Broken Link, Patch, Vendor Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2013-0194.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2013-0194.html Patch, Vendor Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2013-0195.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2013-0195.html Patch, Vendor Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2013-0196.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2013-0196.html Patch, Vendor Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2013-0198.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2013-0198.html Patch, Vendor Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2013-0221.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2013-0221.html Patch, Vendor Advisory
Changed Reference Type
http://www.securityfocus.com/bid/57549 No Types Assigned
http://www.securityfocus.com/bid/57549 Third Party Advisory, VDB Entry
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=713539 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=713539 Issue Tracking, Patch, Vendor Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/81737 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/81737 VDB Entry, Vendor Advisory
Changed Reference Type
https://www.nds.ruhr-uni-bochum.de/research/publications/breaking-xml-encryption-pkcs15/ No Types Assigned
https://www.nds.ruhr-uni-bochum.de/research/publications/breaking-xml-encryption-pkcs15/ Technical Description, Third Party Advisory