mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
121 lines
3.7 KiB
JSON
121 lines
3.7 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2007-1575",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2007-03-21T21:19:00.000",
|
||
|
"lastModified": "2018-10-16T16:39:24.927",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Multiple SQL injection vulnerabilities in PHProjekt 5.2.0, when magic_quotes_gpc is disabled, allow remote authenticated users to execute arbitrary SQL commands via (1) unspecified vectors to the (a) calendar and (2) search modules, and an (2) unspecified cookie when the user logs out."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en el PHProjekt 5.2.0, cuando est\u00e1 deshabilitado el magic_quotes_gpc, permiten a usuarios remotos autenticados ejecutar comandos SQL de su elecci\u00f3n mediante (1) vectores sin especificar de los m\u00f3dulos (a) calendario y (b) b\u00fasqueda y (2) una cookie sin especificar cuando el usuario sale del sistema."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "PARTIAL",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "PARTIAL",
|
||
|
"baseScore": 7.5
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 10.0,
|
||
|
"impactScore": 6.4,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": true,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "NVD-CWE-Other"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phprojekt:phprojekt:5.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C576BBEB-3180-4825-8F36-890E40C2D412"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phprojekt:phprojekt:5.1.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "EE46C669-9363-474E-8BD8-F2547B076EC1"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phprojekt:phprojekt:5.1.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A0A52D65-B1C6-4D6A-A0AB-CD40FADCFA9C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:phprojekt:phprojekt:5.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0362FFCE-759E-47D8-BBDE-FBA155B6594D"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://security.gentoo.org/glsa/glsa-200706-07.xml",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://securityreason.com/securityalert/2466",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.nruns.com/security_advisory_phprojekt_sql_injection.php",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.phprojekt.com/index.php?name=News&file=article&sid=276",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Patch",
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/archive/1/462789/100/0/threaded",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/22955",
|
||
|
"source": "cve@mitre.org"
|
||
|
}
|
||
|
]
|
||
|
}
|