2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-4508" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-12-23T00:03:00.000" ,
"lastModified" : "2011-03-08T02:28:24.737" ,
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Nexus Concepts Dev Hound 2.24 and earlier allows remote attackers to obtain the installation path via a URL containing a non-existent .dll file."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.0
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:1.50:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2B8B3368-2E38-414D-A5F6-0C19ADB13F9B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:1.51:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DF82EFEB-2044-46C5-92C9-28D2C515AA5D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:1.52:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5BD4669B-A654-4F3D-88A5-6CF2CA8AFA66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:1.60:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CD2CBCEF-6D8E-40EB-872C-3AD0A635C5B0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:1.61:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "262693AA-A5E3-4C95-8FDD-81B87B240A09"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:1.70:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DCD99F34-116C-4C05-BA2D-9F04226007FF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:1.80:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CD3E8036-FDE6-470C-8EB4-E140CD439C8C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:1.81:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "92028B43-5A53-40C5-B7BB-6024A45E2168"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9F530D6F-B32E-4792-992B-A1084C1A0931"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:2.01:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1FBCBCD9-D9DE-48AD-98D2-FE32F4058D15"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:2.02:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "012A3CA1-D8CC-4AF2-92B2-60A49282AACC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:2.03:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6B94A836-EBA3-4D19-876A-6874B5F5A439"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:2.04:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F359443-A3C8-4626-BABC-59AD4993B871"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:2.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1ED59151-D206-49A1-A3B5-61B14C698839"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:2.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B6F047C8-E9E4-46C5-839F-33AAB03DB6F7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:2.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "46884085-0443-4248-BE18-F32F1816B589"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:2.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "47A1C219-56F2-4EED-81A8-0D5AF71ECEB4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:2.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9691C823-3FAB-4906-9C3C-B88F9056C639"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:2.21:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F5453F8-3963-45AC-A5DC-DDCD0258739F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:2.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C865EEFD-5212-4BDF-9A01-BBDEE0A3B324"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:2.23:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8C445658-0CD2-479E-8901-405F987275D5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nexus_concepts:dev_hound:2.24:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A35D603F-C124-4FB0-A9F4-BD42057832C4"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/18164" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.exploitlabs.com/files/advisories/EXPL-A-2005-017-devhound.txt" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2005/3047" ,
"source" : "cve@mitre.org"
}
]
}