107 lines
3.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-4026",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-12-05T11:03:00.000",
"lastModified": "2018-09-27T21:39:53.500",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "search.php in Geeklog 1.4.x before 1.4.0rc1, and 1.3.x before 1.3.11sr3, allows remote attackers to obtain sensitive information via invalid (1) datestart and (2) dateend parameters, which leaks the web server path in an error message."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geeklog:geeklog:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.3.0",
"versionEndIncluding": "1.3.11",
"matchCriteriaId": "6195A0F8-DC1D-4239-94C9-4FD35C4EF4E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A08FCCA2-886A-4B8B-B3E5-0A62C8E58B43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11:sr1:*:*:*:*:*:*",
"matchCriteriaId": "B7B2FCD0-5295-4E27-A9AB-4E55CDC4CAF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11:sr2:*:*:*:*:*:*",
"matchCriteriaId": "25E45D9D-ADAF-427F-9B77-FCA02EC0E489"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geeklog:geeklog:1.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7B874DF3-F79C-4AA7-9FDE-3AEF62D3AFF8"
}
]
}
]
}
],
"references": [
{
"url": "http://pridels0.blogspot.com/2005/11/geeklog-14x-full-path-disclosure-vuln.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.geeklog.net/article.php/geeklog-1.3.11sr3",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}