94 lines
2.3 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-4264",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-12-15T11:03:00.000",
"lastModified": "2011-03-08T02:27:55.437",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in index.php in PHP Support Tickets 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) username and (2) password fields, and (3) id parameter."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:triangle_solutions:php_support_tickets:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "326B3A67-2954-4204-8F3B-0873A9872899"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1015352",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.nii.co.in/vuln/PHPSupportTickets.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/15853",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2005/2928",
"source": "cve@mitre.org"
}
]
}