mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
116 lines
3.6 KiB
JSON
116 lines
3.6 KiB
JSON
{
|
|
"id": "CVE-2002-1499",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2003-04-02T05:00:00.000",
|
|
"lastModified": "2008-09-05T20:30:45.577",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple SQL injection vulnerabilities in FactoSystem CMS allows remote attackers to perform unauthorized database actions via (1) the authornumber parameter in author.asp, (2) the discussblurbid parameter in discuss.asp, (3) the name parameter in holdcomment.asp, and (4) the email parameter in holdcomment.asp."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n de SQL en FactoSystem CMS permite a atacantes remotos realizar actividades no autorizadas sobre la base de datos mediante\r\nel par\u00e1metro authornumber en author.asp\r\nel par\u00e1metro discussblurbid en discuss.asp\r\nel par\u00e1metro name en holdcomment.asp, y\r\nel par\u00e1metro email e holdcomment.asp"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": true,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:factosystem:factosystem_weblog:0.9b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "28DE2021-421E-43DB-AC40-42250B80C4B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:factosystem:factosystem_weblog:1.0_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D22DB23C-1B4D-4E13-8FF6-698477D93FD8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:factosystem:factosystem_weblog:1.1_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9811AF8-D769-473A-98ED-6A30E199C734"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0097.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://online.securityfocus.com/archive/1/290021",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://sourceforge.net/tracker/index.php?func=detail&aid=602711&group_id=12668&atid=112668",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.iss.net/security_center/static/10000.php",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/5600",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |