mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
115 lines
3.3 KiB
JSON
115 lines
3.3 KiB
JSON
{
|
|
"id": "CVE-2005-4249",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2005-12-15T11:03:00.000",
|
|
"lastModified": "2024-02-14T01:17:43.863",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "ADP Forum 2.0 through 2.0.3 stores sensitive information in plaintext files under the web document root with insufficient access control, which allows remote attackers to obtain user credentials via requests to the forum/users directory."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "ADP Forum 2.0 a 2.0.3 almacena informaci\u00f3n sensible en ficheros en texto plano bajo la ra\u00edz de documentos del servidor web con control de acceso insuficiente, lo que permite a atacantes remotos obtener credenciales de usuario mediante peticiones al directorio foro/usuarios."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adp:adp_forum:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F6D9512-16CB-4F31-A8AB-1047B99A9278"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adp:adp_forum:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F067AF45-2288-498D-9B86-80D83C7654F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adp:adp_forum:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0DB05B89-816E-416D-AEFC-602FF040ADCC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adp:adp_forum:2.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F7A5FCB0-5F01-462E-BB35-0FC8AB9E906E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://secunia.com/advisories/18027",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securityreason.com/securityalert/253",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.blogcu.com/Liz0ziM/144336/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Vendor Advisory",
|
|
"URL Repurposed"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/419393/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |