Skip to content

Commit

Permalink
NVD Sync 2024-08-07 10:02
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Aug 7, 2024
1 parent 93b0352 commit 1611f64
Show file tree
Hide file tree
Showing 15 changed files with 15 additions and 12 deletions.
2 changes: 1 addition & 1 deletion cve/2008/CVE-2008-0560.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"cve": {"id": "CVE-2008-0560", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-04T23:00:00.000", "lastModified": "2024-05-17T00:37:22.223", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "PHP remote file inclusion vulnerability in cforms-css.php in Oliver Seidel cforms (contactforms), a Wordpress plugin, allows remote attackers to execute arbitrary PHP code via a URL in the tm parameter. NOTE: CVE disputes this issue for 7.3, since there is no tm parameter, and the code exits with a fatal error due to a call to an undefined function"}, {"lang": "es", "value": "**CUESTIONADA**Vulnerabilidad de inclusi\u00f3n de archivo PHP remoto en cforms-css.php de Oliver Seidel cforms (contactforms), un plugin de Wordpress. Permite a atacantes remotos ejecutar c\u00f3digo PHP arbitrario a trav\u00e9s de una URL en el par\u00e1metro tm. NOTA: CVE cuestiona esto para 7.3, ya que no hay par\u00e1metro tb y el c\u00f3digo sale con un error fatal debido a una llamada a una funci\u00f3n no definida."}], "metrics": {"cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:contact_forms:cforms:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB5C013D-45CC-4A97-833A-417DB2A7873A"}]}]}], "references": [{"url": "http://securityreason.com/securityalert/3605", "source": "cve@mitre.org"}, {"url": "http://www.attrition.org/pipermail/vim/2008-January/001895.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/487347/100/0/threaded", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40143", "source": "cve@mitre.org"}]}}
{"cve": {"id": "CVE-2008-0560", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-04T23:00:00.000", "lastModified": "2024-08-07T08:15:35.193", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "PHP remote file inclusion vulnerability in cforms-css.php in Oliver Seidel cforms (contactforms), a Wordpress plugin, allows remote attackers to execute arbitrary PHP code via a URL in the tm parameter. NOTE: CVE disputes this issue for 7.3, since there is no tm parameter, and the code exits with a fatal error due to a call to an undefined function"}, {"lang": "es", "value": "**CUESTIONADA**Vulnerabilidad de inclusi\u00f3n de archivo PHP remoto en cforms-css.php de Oliver Seidel cforms (contactforms), un plugin de Wordpress. Permite a atacantes remotos ejecutar c\u00f3digo PHP arbitrario a trav\u00e9s de una URL en el par\u00e1metro tm. NOTA: CVE cuestiona esto para 7.3, ya que no hay par\u00e1metro tb y el c\u00f3digo sale con un error fatal debido a una llamada a una funci\u00f3n no definida."}], "metrics": {"cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:contact_forms:cforms:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB5C013D-45CC-4A97-833A-417DB2A7873A"}]}]}], "references": [{"url": "http://securityreason.com/securityalert/3605", "source": "cve@mitre.org"}, {"url": "http://www.attrition.org/pipermail/vim/2008-January/001895.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/487347/100/0/threaded", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40143", "source": "cve@mitre.org"}]}}
2 changes: 1 addition & 1 deletion cve/2008/CVE-2008-0820.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"cve": {"id": "CVE-2008-0820", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-19T20:44:00.000", "lastModified": "2024-05-17T00:37:32.517", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in index.php in Etomite 0.6.1.4 Final allows remote attackers to inject arbitrary web script or HTML via $_SERVER['PHP_INFO']. NOTE: the vendor disputes this issue in a followup, stating that the affected variable is $_SERVER['PHP_SELF'], and \"This is not an Etomite specific exploit and I would like the report rescinded."}, {"lang": "es", "value": "**CUESTIONADA** Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en index.php de Etomite 0.6.1.4 Final, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de $_SERVER['PHP_INFO']. NOTA: el vendedor impugna este asunto en una investigaci\u00f3n, afirmando que la variable afectada es $_SERVER['PHP_SELF'] y que \u201cEste no es un exploit espec\u00edfico de Etomite y querr\u00edamos anular el informe\u201d"}], "metrics": {"cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:etomite:etomite:0.6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E9920A50-2D21-4A08-B9BB-73BFF2D2E3A6"}]}]}], "references": [{"url": "http://secunia.com/advisories/28964", "source": "cve@mitre.org", "tags": ["Vendor Advisory"]}, {"url": "http://securityreason.com/securityalert/3669", "source": "cve@mitre.org"}, {"url": "http://www.etomite.com/forums/index.php?showtopic=7647", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488122/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488304/100/100/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/27794", "source": "cve@mitre.org", "tags": ["Exploit"]}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40525", "source": "cve@mitre.org"}]}}
{"cve": {"id": "CVE-2008-0820", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-19T20:44:00.000", "lastModified": "2024-08-07T08:15:44.420", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in index.php in Etomite 0.6.1.4 Final allows remote attackers to inject arbitrary web script or HTML via $_SERVER['PHP_INFO']. NOTE: the vendor disputes this issue in a followup, stating that the affected variable is $_SERVER['PHP_SELF'], and \"This is not an Etomite specific exploit and I would like the report rescinded."}, {"lang": "es", "value": "**CUESTIONADA** Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en index.php de Etomite 0.6.1.4 Final, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de $_SERVER['PHP_INFO']. NOTA: el vendedor impugna este asunto en una investigaci\u00f3n, afirmando que la variable afectada es $_SERVER['PHP_SELF'] y que \u201cEste no es un exploit espec\u00edfico de Etomite y querr\u00edamos anular el informe\u201d"}], "metrics": {"cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:etomite:etomite:0.6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E9920A50-2D21-4A08-B9BB-73BFF2D2E3A6"}]}]}], "references": [{"url": "http://secunia.com/advisories/28964", "source": "cve@mitre.org", "tags": ["Vendor Advisory"]}, {"url": "http://securityreason.com/securityalert/3669", "source": "cve@mitre.org"}, {"url": "http://www.etomite.com/forums/index.php?showtopic=7647", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488122/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488304/100/100/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/27794", "source": "cve@mitre.org", "tags": ["Exploit"]}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40525", "source": "cve@mitre.org"}]}}
2 changes: 1 addition & 1 deletion cve/2008/CVE-2008-1171.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"cve": {"id": "CVE-2008-1171", "sourceIdentifier": "cve@mitre.org", "published": "2008-03-05T23:44:00.000", "lastModified": "2024-05-17T00:37:46.770", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "Multiple PHP remote file inclusion vulnerabilities in the 123 Flash Chat Module for phpBB allow remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter to (1) 123flashchat.php and (2) phpbb_login_chat.php. NOTE: CVE disputes this issue because $phpbb_root_path is explicitly set to \"./\" in both programs"}, {"lang": "es", "value": "** CUESTIONADA ** M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de archivo en PHP en el m\u00f3dulo 123 Flash Chat para phpBB permiten a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de un URL en el par\u00e1metro phpbb_root_path de (1) 123flashchat.php y (2) phpbb_login_chat.php. \r\nNOTA: CVE cuestiona esta cuesti\u00f3n porque $phpbb_root_path es expl\u00edcitamente establecido en \"./\" en ambos programas."}], "metrics": {"cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpbb:123_flash_chat_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3A3A631-F338-4F1C-B65E-68F3E889E99A"}]}]}], "references": [{"url": "http://securityreason.com/securityalert/3716", "source": "cve@mitre.org"}, {"url": "http://www.attrition.org/pipermail/vim/2008-March/001913.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488914/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488922/100/0/threaded", "source": "cve@mitre.org"}]}}
{"cve": {"id": "CVE-2008-1171", "sourceIdentifier": "cve@mitre.org", "published": "2008-03-05T23:44:00.000", "lastModified": "2024-08-07T08:15:55.763", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "Multiple PHP remote file inclusion vulnerabilities in the 123 Flash Chat Module for phpBB allow remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter to (1) 123flashchat.php and (2) phpbb_login_chat.php. NOTE: CVE disputes this issue because $phpbb_root_path is explicitly set to \"./\" in both programs"}, {"lang": "es", "value": "** CUESTIONADA ** M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de archivo en PHP en el m\u00f3dulo 123 Flash Chat para phpBB permiten a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de un URL en el par\u00e1metro phpbb_root_path de (1) 123flashchat.php y (2) phpbb_login_chat.php. \r\nNOTA: CVE cuestiona esta cuesti\u00f3n porque $phpbb_root_path es expl\u00edcitamente establecido en \"./\" en ambos programas."}], "metrics": {"cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpbb:123_flash_chat_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3A3A631-F338-4F1C-B65E-68F3E889E99A"}]}]}], "references": [{"url": "http://securityreason.com/securityalert/3716", "source": "cve@mitre.org"}, {"url": "http://www.attrition.org/pipermail/vim/2008-March/001913.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488914/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/488922/100/0/threaded", "source": "cve@mitre.org"}]}}
Loading

0 comments on commit 1611f64

Please sign in to comment.