-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
93b0352
commit 1611f64
Showing
15 changed files
with
15 additions
and
12 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
{"cve": {"id": "CVE-2008-0560", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-04T23:00:00.000", "lastModified": "2024-05-17T00:37:22.223", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "PHP remote file inclusion vulnerability in cforms-css.php in Oliver Seidel cforms (contactforms), a Wordpress plugin, allows remote attackers to execute arbitrary PHP code via a URL in the tm parameter. NOTE: CVE disputes this issue for 7.3, since there is no tm parameter, and the code exits with a fatal error due to a call to an undefined function"}, {"lang": "es", "value": "**CUESTIONADA**Vulnerabilidad de inclusi\u00f3n de archivo PHP remoto en cforms-css.php de Oliver Seidel cforms (contactforms), un plugin de Wordpress. Permite a atacantes remotos ejecutar c\u00f3digo PHP arbitrario a trav\u00e9s de una URL en el par\u00e1metro tm. NOTA: CVE cuestiona esto para 7.3, ya que no hay par\u00e1metro tb y el c\u00f3digo sale con un error fatal debido a una llamada a una funci\u00f3n no definida."}], "metrics": {"cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:contact_forms:cforms:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB5C013D-45CC-4A97-833A-417DB2A7873A"}]}]}], "references": [{"url": "http://securityreason.com/securityalert/3605", "source": "cve@mitre.org"}, {"url": "http://www.attrition.org/pipermail/vim/2008-January/001895.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/487347/100/0/threaded", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40143", "source": "cve@mitre.org"}]}} | ||
{"cve": {"id": "CVE-2008-0560", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-04T23:00:00.000", "lastModified": "2024-08-07T08:15:35.193", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "PHP remote file inclusion vulnerability in cforms-css.php in Oliver Seidel cforms (contactforms), a Wordpress plugin, allows remote attackers to execute arbitrary PHP code via a URL in the tm parameter. NOTE: CVE disputes this issue for 7.3, since there is no tm parameter, and the code exits with a fatal error due to a call to an undefined function"}, {"lang": "es", "value": "**CUESTIONADA**Vulnerabilidad de inclusi\u00f3n de archivo PHP remoto en cforms-css.php de Oliver Seidel cforms (contactforms), un plugin de Wordpress. Permite a atacantes remotos ejecutar c\u00f3digo PHP arbitrario a trav\u00e9s de una URL en el par\u00e1metro tm. NOTA: CVE cuestiona esto para 7.3, ya que no hay par\u00e1metro tb y el c\u00f3digo sale con un error fatal debido a una llamada a una funci\u00f3n no definida."}], "metrics": {"cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:contact_forms:cforms:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB5C013D-45CC-4A97-833A-417DB2A7873A"}]}]}], "references": [{"url": "http://securityreason.com/securityalert/3605", "source": "cve@mitre.org"}, {"url": "http://www.attrition.org/pipermail/vim/2008-January/001895.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/487347/100/0/threaded", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40143", "source": "cve@mitre.org"}]}} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
{"cve": {"id": "CVE-2008-0820", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-19T20:44:00.000", "lastModified": "2024-05-17T00:37:32.517", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in index.php in Etomite 0.6.1.4 Final allows remote attackers to inject arbitrary web script or HTML via $_SERVER['PHP_INFO']. NOTE: the vendor disputes this issue in a followup, stating that the affected variable is $_SERVER['PHP_SELF'], and \"This is not an Etomite specific exploit and I would like the report rescinded."}, {"lang": "es", "value": "**CUESTIONADA** Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en index.php de Etomite 0.6.1.4 Final, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de $_SERVER['PHP_INFO']. NOTA: el vendedor impugna este asunto en una investigaci\u00f3n, afirmando que la variable afectada es $_SERVER['PHP_SELF'] y que \u201cEste no es un exploit espec\u00edfico de Etomite y querr\u00edamos anular el informe\u201d"}], "metrics": {"cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:etomite:etomite:0.6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E9920A50-2D21-4A08-B9BB-73BFF2D2E3A6"}]}]}], "references": [{"url": "http://secunia.com/advisories/28964", "source": "cve@mitre.org", "tags": ["Vendor Advisory"]}, {"url": "http://securityreason.com/securityalert/3669", "source": "cve@mitre.org"}, {"url": "http://www.etomite.com/forums/index.php?showtopic=7647", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488122/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488304/100/100/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/27794", "source": "cve@mitre.org", "tags": ["Exploit"]}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40525", "source": "cve@mitre.org"}]}} | ||
{"cve": {"id": "CVE-2008-0820", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-19T20:44:00.000", "lastModified": "2024-08-07T08:15:44.420", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in index.php in Etomite 0.6.1.4 Final allows remote attackers to inject arbitrary web script or HTML via $_SERVER['PHP_INFO']. NOTE: the vendor disputes this issue in a followup, stating that the affected variable is $_SERVER['PHP_SELF'], and \"This is not an Etomite specific exploit and I would like the report rescinded."}, {"lang": "es", "value": "**CUESTIONADA** Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en index.php de Etomite 0.6.1.4 Final, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de $_SERVER['PHP_INFO']. NOTA: el vendedor impugna este asunto en una investigaci\u00f3n, afirmando que la variable afectada es $_SERVER['PHP_SELF'] y que \u201cEste no es un exploit espec\u00edfico de Etomite y querr\u00edamos anular el informe\u201d"}], "metrics": {"cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:etomite:etomite:0.6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E9920A50-2D21-4A08-B9BB-73BFF2D2E3A6"}]}]}], "references": [{"url": "http://secunia.com/advisories/28964", "source": "cve@mitre.org", "tags": ["Vendor Advisory"]}, {"url": "http://securityreason.com/securityalert/3669", "source": "cve@mitre.org"}, {"url": "http://www.etomite.com/forums/index.php?showtopic=7647", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488122/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488304/100/100/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/27794", "source": "cve@mitre.org", "tags": ["Exploit"]}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40525", "source": "cve@mitre.org"}]}} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
{"cve": {"id": "CVE-2008-1171", "sourceIdentifier": "cve@mitre.org", "published": "2008-03-05T23:44:00.000", "lastModified": "2024-05-17T00:37:46.770", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "Multiple PHP remote file inclusion vulnerabilities in the 123 Flash Chat Module for phpBB allow remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter to (1) 123flashchat.php and (2) phpbb_login_chat.php. NOTE: CVE disputes this issue because $phpbb_root_path is explicitly set to \"./\" in both programs"}, {"lang": "es", "value": "** CUESTIONADA ** M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de archivo en PHP en el m\u00f3dulo 123 Flash Chat para phpBB permiten a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de un URL en el par\u00e1metro phpbb_root_path de (1) 123flashchat.php y (2) phpbb_login_chat.php. \r\nNOTA: CVE cuestiona esta cuesti\u00f3n porque $phpbb_root_path es expl\u00edcitamente establecido en \"./\" en ambos programas."}], "metrics": {"cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpbb:123_flash_chat_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3A3A631-F338-4F1C-B65E-68F3E889E99A"}]}]}], "references": [{"url": "http://securityreason.com/securityalert/3716", "source": "cve@mitre.org"}, {"url": "http://www.attrition.org/pipermail/vim/2008-March/001913.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488914/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488922/100/0/threaded", "source": "cve@mitre.org"}]}} | ||
{"cve": {"id": "CVE-2008-1171", "sourceIdentifier": "cve@mitre.org", "published": "2008-03-05T23:44:00.000", "lastModified": "2024-08-07T08:15:55.763", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "Multiple PHP remote file inclusion vulnerabilities in the 123 Flash Chat Module for phpBB allow remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter to (1) 123flashchat.php and (2) phpbb_login_chat.php. NOTE: CVE disputes this issue because $phpbb_root_path is explicitly set to \"./\" in both programs"}, {"lang": "es", "value": "** CUESTIONADA ** M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de archivo en PHP en el m\u00f3dulo 123 Flash Chat para phpBB permiten a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de un URL en el par\u00e1metro phpbb_root_path de (1) 123flashchat.php y (2) phpbb_login_chat.php. \r\nNOTA: CVE cuestiona esta cuesti\u00f3n porque $phpbb_root_path es expl\u00edcitamente establecido en \"./\" en ambos programas."}], "metrics": {"cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpbb:123_flash_chat_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3A3A631-F338-4F1C-B65E-68F3E889E99A"}]}]}], "references": [{"url": "http://securityreason.com/securityalert/3716", "source": "cve@mitre.org"}, {"url": "http://www.attrition.org/pipermail/vim/2008-March/001913.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488914/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488922/100/0/threaded", "source": "cve@mitre.org"}]}} |
Oops, something went wrong.