ID CVE-2017-1000500 Type cve Reporter cve@mitre.org Modified 2018-12-10T14:29:00
Description
REJECT DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-12161. Reason: This candidate is a reservation duplicate of CVE-2017-12161. Notes: All CVE users should reference CVE-2017-12161 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
{"id": "CVE-2017-1000500", "bulletinFamily": "NVD", "title": "CVE-2017-1000500", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-12161. Reason: This candidate is a reservation duplicate of CVE-2017-12161. Notes: All CVE users should reference CVE-2017-12161 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "published": "2018-01-03T15:29:00", "modified": "2018-12-10T14:29:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000500", "reporter": "cve@mitre.org", "references": [], "cvelist": ["CVE-2017-1000500"], "type": "cve", "lastseen": "2019-05-29T18:16:46", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cpe23", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvelist", "hash": "90b013083c8659005f94ce4e99ce7ddf"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "cvss2", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "description", "hash": "a706a41a343d46f105cf0d4858bff19e"}, {"key": "href", "hash": "d94b634aba0e177cdb094ede5f8dcc4e"}, {"key": "modified", "hash": "c8b2066b26a807fb81ff4bb18aa7cc75"}, {"key": "published", "hash": "fc6be4640d1915607702ae0d3d391216"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "0ffcccc7c1f34565e44ab828f1130075"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "3080a683040b29a13098083a514c175a60a2ac28612baf63c8cb1ad384684ab1", "viewCount": 0, "enchantments": {"score": {"value": -0.1, "vector": "NONE", "modified": "2019-05-29T18:16:46"}, "dependencies": {"references": [], "modified": "2019-05-29T18:16:46"}, "vulnersScore": -0.1}, "objectVersion": "1.3", "cpe": [], "affectedSoftware": [], "cvss2": {}, "cvss3": {}, "cpe23": [], "cwe": []}
{"github": [{"lastseen": "2019-11-21T12:51:04", "bulletinFamily": "software", "description": "Keycloak SSO versions prior to 2.x are vulnerable to Host Header Injection on the forgot password page causing the application to send a poisoned URL as the password reset link.", "modified": "2019-07-03T21:02:04", "published": "2018-10-18T16:48:15", "id": "GHSA-QGM9-232X-HWPX", "href": "https://github.com/advisories/GHSA-qgm9-232x-hwpx", "title": "Moderate severity vulnerability that affects org.keycloak:keycloak-core", "type": "github", "cvss": {"score": 0.0, "vector": "NONE"}}]}