René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

196 lines
6.7 KiB
JSON

{
"id": "CVE-2008-2064",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-05-02T23:20:00.000",
"lastModified": "2017-08-08T01:30:43.590",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in PhpGedView before 4.1.5 have unknown impact and attack vectors related to \"a fundamental design flaw in the interface (API) to connect phpGedView with external programs like content management systems.\""
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades no especificadas en PhpGedView versiones anteriores a 4.1.5, presenta un impacto desconocido y vectores de ataque relacionados con \"a fundamental design flaw in the interface (API) to connect phpGedView with external programs like content management systems.\""
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": true,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.1.4",
"matchCriteriaId": "B72A5889-BB71-4B29-85F0-54301AC39A97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E2023444-2ED3-493B-BAD4-E1CB35E5AEE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "08CC63D1-93D0-4824-9462-F881D775E3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:0.95:*:*:*:*:*:*:*",
"matchCriteriaId": "B3E12DB8-EAD0-4F5C-B785-D4C3C24345D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F39A506-086F-4A95-AA7B-44B2CA45D9A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6F92B851-F2A2-4BDE-A5D5-FCFEB7737992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:1.04:*:*:*:*:*:*:*",
"matchCriteriaId": "D3E4F77A-FC26-41AB-B5CA-13D433BB5B8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "395FAED4-94DE-4C7D-AF1B-BE0586189587"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "7F58F44C-F317-4AEF-9394-A18DEE8E52A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "52600D9B-44DC-4C5E-9105-F514FD6EF19E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "3C00EF07-DA5D-4F60-879A-83C3FC376049"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA13EED-7C5F-4F5E-AEC2-D5DA0206B238"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:2.65:*:*:*:*:*:*:*",
"matchCriteriaId": "12A0E38B-C9E3-4619-B1A1-94C11546D6DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CA5AC706-5C75-422A-9C70-09EA3827002B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "328757A4-D90E-46A2-9B4A-AF0F4D5BDFEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:3.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3F1A017B-DC5C-41F6-A489-D37C9223124C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B3442CF0-EBFC-40DD-930C-1EAC1CAF06C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "30317A7C-91E3-4D25-9A5D-A8F49674C67D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgedview:phpgedview:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BCE3A384-54FC-4672-B395-A73696B64FCB"
}
]
}
]
}
],
"references": [
{
"url": "http://sourceforge.net/project/shownotes.php?group_id=55456&release_id=595222",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1580",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.phpgedview.net/",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/28978",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42085",
"source": "cve@mitre.org"
}
]
}