{ "id": "CVE-2003-1162", "sourceIdentifier": "cve@mitre.org", "published": "2003-12-31T05:00:00.000", "lastModified": "2024-11-20T23:46:30.387", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "index.php in Tritanium Bulletin Board 1.2.3 allows remote attackers to read and reply to arbitrary messages by modifying the thread_id, forum_id, and sid parameters." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:0.993_beta:*:*:*:*:*:*:*", "matchCriteriaId": "560C0639-351B-40A3-B613-A4043293511E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:0.994_beta:*:*:*:*:*:*:*", "matchCriteriaId": "64AD01A0-4A2C-4AA6-B090-9BAEC28ABE83" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:0.999_beta:*:*:*:*:*:*:*", "matchCriteriaId": "257C937F-FB66-42DB-987C-D23CCA1ED0B7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:1.0_beta:*:*:*:*:*:*:*", "matchCriteriaId": "1E67CC50-C1E2-4CFD-839C-90DF2EF353FB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:1.1_final:*:*:*:*:*:*:*", "matchCriteriaId": "8EBF4D35-0228-487A-8D6B-78C126E24631" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "819B8784-71B7-45FF-9EF9-FA69000CA050" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "793AC3B6-E723-4F72-BF9C-EFDB79300D26" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D086966B-60A3-49BE-A16E-FE5B93FFFFF8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "CBCE8AE0-2C1D-4151-8377-1CECCF642FB3" } ] } ] } ], "references": [ { "url": "http://archives.neohapsis.com/archives/bugtraq/2003-10/0348.html", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://secunia.com/advisories/10135", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.osvdb.org/2770", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/8944", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13587", "source": "cve@mitre.org" }, { "url": "http://archives.neohapsis.com/archives/bugtraq/2003-10/0348.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://secunia.com/advisories/10135", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://www.osvdb.org/2770", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/8944", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13587", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }