mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
121 lines
4.0 KiB
JSON
121 lines
4.0 KiB
JSON
{
|
|
"id": "CVE-2010-0976",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2010-03-16T19:30:00.493",
|
|
"lastModified": "2024-11-21T01:13:20.220",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Acidcat CMS 3.5.x does not prevent access to install.asp after installation finishes, which might allow remote attackers to restart the installation process and have unspecified other impact via requests to install.asp and other install_*.asp scripts. NOTE: the final installation screen states \"Important: you must now delete all files beginning with 'install' from the root directory.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Acidcat CMS v3.5.x no previene el acceso a install.asp despu\u00e9s de finalizada la instalaci\u00f3n, lo que puede permitir a atacantes remotos retomar el proceso de instalaci\u00f3n y producir otro impactos no especificados a trav\u00e9s de peticiones a install.asp y otros c\u00f3digos en install_*.asp. NOTA: La pantalla final de la instalaci\u00f3n \"Importante: Debe borrar todos los archivos iniciales con 'install' desde el directorio root\"."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"baseScore": 7.5,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:acidcat:acidcat_cms:3.5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "64D1AC55-4A21-44E9-AAB3-360F795DBCF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:acidcat:acidcat_cms:3.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E1F5328F-D230-4CD9-AAAA-DBE924ED91EF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:acidcat:acidcat_cms:3.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "257D0C22-7893-489C-85F3-586D55265759"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:acidcat:acidcat_cms:3.5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9AAE4867-ED75-46B8-8E17-66527D753110"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://packetstormsecurity.org/1001-exploits/acidcatcms-disclose.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.exploit-db.com/exploits/10972",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55331",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://packetstormsecurity.org/1001-exploits/acidcatcms-disclose.txt",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.exploit-db.com/exploits/10972",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55331",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |