120 lines
4.0 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2009-3961",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-11-17T18:30:00.420",
"lastModified": "2009-11-24T07:04:28.203",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in user.php in Super Serious Stats (aka superseriousstats) before 1.1.2p1 allows remote attackers to execute arbitrary SQL commands via the uid parameter, related to an \"incorrect regexp.\" NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en user.php en Super Serious Stats (tambi\u00e9n conocido como superseriousstats) anteriores a v1.1.2p1 permite a atacantes remotos ejecutar comandos SQL de forma arbitraria a trav\u00e9s del par\u00e1metro \"uid\", relacionado con \"incorrect regexp.\". NOTA: Algunos de los detalles fueron obtenidos de terceras partes."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.1.2",
"matchCriteriaId": "E67DC620-75B6-4432-871D-312885277899"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "32A6FFBE-936F-497E-A057-964937F0A8BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D1FB0BA3-7D35-430B-AC9C-82A6770C7AAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0BADEA01-DA2C-4E6F-81BF-0C5D861AE6E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "8718D0DA-9803-4265-8848-54A00055E671"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D07DAB5-39E0-4758-BD42-7DB4C71D8DC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E23D3D44-6423-4C3E-8E96-932786D4A610"
}
]
}
]
}
],
"references": [
{
"url": "http://code.google.com/p/superseriousstats/",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/3175",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}