95 lines
2.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-3682",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-11-18T23:03:00.000",
"lastModified": "2017-07-11T01:33:16.737",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in Wizz Forum 1.20 allow remote attackers to execute arbitrary SQL commands via (1) the AuthID parameter in ForumAuthDetails.php, and the TopicID parameter in (2) ForumTopicDetails.php and (3) ForumReply.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wizz_forum:wizz_forum:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "7215D4C1-BC2B-4E69-805E-E5D6A3C40879"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=113201564319843&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/181",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/15410/references",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2005/2421",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23170",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23171",
"source": "cve@mitre.org"
}
]
}