{ "id": "CVE-2004-2623", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", "lastModified": "2024-11-20T23:53:49.700", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Rippy the Aggregator before 0.10, when register_globals is enabled, has unknown attack vectors and impact, possibly related to the \"user-controlled filter.\"" } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:matthew_skala:rippy_the_aggregator:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4061EA0F-6EAA-4B57-AA3D-220108F5451F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:matthew_skala:rippy_the_aggregator:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "37B9E210-24D2-4603-9C1D-EFF65C3B445C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:matthew_skala:rippy_the_aggregator:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "35C35D5B-A66A-481D-8D9B-C8982F444B9A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:matthew_skala:rippy_the_aggregator:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4790E6F4-EECA-4CE2-80C0-0A4922333F19" }, { "vulnerable": true, "criteria": "cpe:2.3:a:matthew_skala:rippy_the_aggregator:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B35E4FB9-C976-4887-BE7C-E4D4D651C6A1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:matthew_skala:rippy_the_aggregator:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "CA9784BC-3DF7-4FE0-9539-8E86C7C10202" }, { "vulnerable": true, "criteria": "cpe:2.3:a:matthew_skala:rippy_the_aggregator:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "7418376C-4121-4D4E-AF2E-B4948786A2A7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:matthew_skala:rippy_the_aggregator:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B5F79A97-968F-4EBA-884B-0941EC91CFBA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:matthew_skala:rippy_the_aggregator:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D191BC4C-6E26-42A2-9B8D-37A9954C6B38" } ] } ] } ], "references": [ { "url": "http://ansuz.sooke.bc.ca/rippy/ChangeLog", "source": "cve@mitre.org" }, { "url": "http://freshmeat.net/projects/rippy/?branch_id=30091&release_id=173997", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/12769", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1011582", "source": "cve@mitre.org" }, { "url": "http://www.osvdb.org/10481", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17674", "source": "cve@mitre.org" }, { "url": "http://ansuz.sooke.bc.ca/rippy/ChangeLog", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://freshmeat.net/projects/rippy/?branch_id=30091&release_id=173997", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://secunia.com/advisories/12769", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1011582", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.osvdb.org/10481", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17674", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }