{ "schema_version": "1.4.0", "id": "GHSA-v5qw-pp2p-cvpr", "modified": "2022-05-14T03:35:51Z", "published": "2022-05-14T03:35:51Z", "aliases": [ "CVE-2013-7239" ], "details": "memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7239" }, { "type": "WEB", "url": "https://code.google.com/p/memcached/wiki/ReleaseNotes1417" }, { "type": "WEB", "url": "http://seclists.org/oss-sec/2013/q4/572" }, { "type": "WEB", "url": "http://secunia.com/advisories/56183" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-2832" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/64559" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2080-1" } ], "database_specific": { "cwe_ids": [ "CWE-287" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-01-13T21:55:00Z" } }