{ "id": "CVE-2004-1509", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", "lastModified": "2017-07-11T01:31:05.653", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "validate.php in WebCalendar allows remote attackers to gain sensitive information via an invalid encoded_login parameter, which reveals the full path in an error message." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "AE2EABBA-AE17-44B6-9789-6E24D794A3A5" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "25AD3E54-46F8-4DE0-86CE-D5D3FF079787" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.15:*:*:*:*:*:*:*", "matchCriteriaId": "3857C666-0421-4EC8-80F4-2A62D44A1DDB" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9BB322-7C8F-4ACB-8809-2A96C0F9D65E" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C4AA766-E1FC-4AEA-A2C6-9998A395F978" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.20:*:*:*:*:*:*:*", "matchCriteriaId": "83918F72-9289-4C14-AC44-46A848DD0487" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.21:*:*:*:*:*:*:*", "matchCriteriaId": "8B1BCC1F-3031-49CB-95EF-C733D0A24EEF" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.22:*:*:*:*:*:*:*", "matchCriteriaId": "EAC57185-15AA-414B-9779-AF89170B9E85" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.23:*:*:*:*:*:*:*", "matchCriteriaId": "2BCFF5B6-324C-43EC-AAF3-EBBA23C2C583" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.24:*:*:*:*:*:*:*", "matchCriteriaId": "C7E93824-0B9A-4B6C-A60B-78942160DF92" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.25:*:*:*:*:*:*:*", "matchCriteriaId": "C7D31CCF-3D1C-472F-B940-758A607111BC" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.26:*:*:*:*:*:*:*", "matchCriteriaId": "3E2B148A-C41F-44C7-A044-002F25FA06C8" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.27:*:*:*:*:*:*:*", "matchCriteriaId": "B69D3BF4-E0CD-4844-BF5B-BBE5B9D989DD" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.28:*:*:*:*:*:*:*", "matchCriteriaId": "6B73A4C5-4D6A-4CB8-9CB9-DFD038B869FE" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.29:*:*:*:*:*:*:*", "matchCriteriaId": "96780B29-70A4-41B9-BFAE-F6AE56526A17" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.30:*:*:*:*:*:*:*", "matchCriteriaId": "206445B6-2D25-46B6-8ED2-32CEF068CD2A" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.31:*:*:*:*:*:*:*", "matchCriteriaId": "576E931E-A40F-4087-B810-9BAA11464452" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.32:*:*:*:*:*:*:*", "matchCriteriaId": "D1BFF736-D44F-4A13-A67E-1D3103F6DBF0" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.33:*:*:*:*:*:*:*", "matchCriteriaId": "5F26E6E8-9EAB-4293-B12F-D81973C01447" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.34:*:*:*:*:*:*:*", "matchCriteriaId": "AD49942E-171A-44E4-AE84-301F3E39B117" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.35:*:*:*:*:*:*:*", "matchCriteriaId": "0925C97E-E404-46A6-952A-BDF64D7EAF1A" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.36:*:*:*:*:*:*:*", "matchCriteriaId": "D5611335-10FE-4040-AF02-A2C871DAF3A1" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.37:*:*:*:*:*:*:*", "matchCriteriaId": "6CCFB394-8FA7-4076-8098-37D569829B31" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.38:*:*:*:*:*:*:*", "matchCriteriaId": "9CB49B00-95CE-43A0-B64F-D2014692C7D4" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.39:*:*:*:*:*:*:*", "matchCriteriaId": "F2809B65-50FC-4536-8A61-D8164EE99320" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.40:*:*:*:*:*:*:*", "matchCriteriaId": "0FC47C91-B1FF-404B-8F73-37E325FCC566" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.41:*:*:*:*:*:*:*", "matchCriteriaId": "69A232F7-49E3-49B6-951A-1048D71BCF03" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.42:*:*:*:*:*:*:*", "matchCriteriaId": "3BE65D8C-C531-4212-AEF6-003A869030FE" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.43:*:*:*:*:*:*:*", "matchCriteriaId": "7F803CC2-7E5E-460B-95CA-33BD80DC1CF7" }, { "vulnerable": false, "criteria": "cpe:2.3:a:webcalendar:webcalendar:0.9.44:*:*:*:*:*:*:*", "matchCriteriaId": "A2BE8F76-8C07-49BD-9E66-9790C0E8EDF7" } ] } ] } ], "references": [ { "url": "http://marc.info/?l=bugtraq&m=110011618724455&w=2", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/11651", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18029", "source": "cve@mitre.org" } ] }