2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-4694" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-12-31T05:00:00.000" ,
"lastModified" : "2017-07-20T01:29:22.470" ,
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Unspecified vulnerability in the www_add method in Asset.pm in Plain Black WebGUI 6.3.0 and other versions before 6.7.6 allows attackers to execute arbitrary code via unknown attack vectors."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 7.5
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : true ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6E92144A-C66C-4959-B06A-39283EE43915"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "607C1B59-8C27-48D1-B4F2-8C7CCA293E32"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "41B536B2-0C3E-4A9B-B6C7-F3DAA8F4119D"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "796E640B-D3EF-4BB9-8521-62BDA198E013"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F10FF6A-509A-4729-A104-35CE16D16E50"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BB3B80DB-6431-439B-B5FF-6DD8E3C04248"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.5.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EADCABBD-1745-4D0F-8347-C2EA8EC41DC0"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.5.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B9C1892F-716B-46D2-B74D-ACE9BB87E709"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.5.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FD6D9E39-EE7C-4D2F-BC92-6A23F3C65629"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6F6C4F60-45AF-4888-BC79-229943953D9D"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AC90D92C-9028-430C-BCA5-E16EA69524F9"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.6.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6EEEF194-0EA2-4560-8CD9-02606183A663"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.6.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D30D285D-F51C-4B1D-8AEE-00984C23C6D3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.6.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F23DB394-9885-4505-89DB-03C92302958C"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BEB72220-4AA2-4C30-B934-BBC0F72869C6"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BA8972F3-4AEA-4572-9177-9E3D9A34BB18"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C6933824-00C3-4F0F-A705-83A8DFB7667D"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "58471E98-F111-4119-8C94-F978823ADFD1"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BBD6A204-D86F-4021-AD9F-EB49CC597200"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "58CEFD97-46E8-4E27-854C-21FE07816595"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:plain_black:webgui:6.7.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0295B68E-4F07-44BD-B3FF-9E73870B1AE9"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/17158" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.osvdb.org/19933" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.plainblack.com/getwebgui/advisories/security-exploit-patch-for-6.3-and-above" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/15083" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Patch"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2005/2060" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22730" ,
"source" : "cve@mitre.org"
}
]
}