141 lines
3.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2006-0660",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-02-13T11:06:00.000",
"lastModified": "2018-10-19T15:45:46.037",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Multiple directory traversal vulnerabilities in FarsiNews 2.5 and earlier allows remote attackers to (1) read arbitrary files or trigger an error message path disclosure via \"..\" or invalid names in the archive parameter to index.php, or (2) include arbitrary files via the template parameter to show_archives.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 6.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:farsinews:farsinews:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB2CEC8-7EFF-410F-A4E2-CDC515F9E38E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:farsinews:farsinews:2.1_beta2:*:*:*:*:*:*:*",
"matchCriteriaId": "4F6F8CFD-D03F-494E-96E0-A8C9CCDC6355"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:farsinews:farsinews:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3F0B6F-F519-4717-B1A4-5CE599DB611F"
}
]
}
]
}
],
"references": [
{
"url": "http://forum.farsinewsteam.com/index.php?showtopic=71",
"source": "cve@mitre.org"
},
{
"url": "http://forum.farsinewsteam.com/index.php?showtopic=76",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/18768",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.hamid.ir/security/farsinews2-5.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.osvdb.org/23020",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/23021",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/23022",
"source": "cve@mitre.org"
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.securityfocus.com/archive/1/424720/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/16580",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/0506",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24598",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24602",
"source": "cve@mitre.org"
}
]
}