mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
167 lines
5.8 KiB
JSON
167 lines
5.8 KiB
JSON
{
|
|
"id": "CVE-2006-3196",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-06-23T00:02:00.000",
|
|
"lastModified": "2018-10-18T16:46:12.737",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "index.php in singapore 0.10.0 and earlier allows remote attackers to obtain the installation path via an invalid template parameter, which reveals the path in an error message."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "index.php en Singapore v0.10.0 y anteriores permite a atacantes remotos obtener la ruta de instalaci\u00f3n a trav\u00e9s de un par\u00e1metro de plantilla no v\u00e1lida, lo que revela la ruta en un mensaje de error."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9.1_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0AC1508-0AC0-412C-A1D7-E5E822BE44C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9.2_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ACACF5FB-A2FD-4176-BE8C-28F71ECD2712"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9.3_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B16CB109-13CC-4493-8DC9-0798252A241E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9.4_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8072C488-C0F3-47C4-AC07-325DB9E41D67"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9.5_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A018C38A-F41A-4F93-93FA-3BA26ACB89DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9.6_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0A045A4-A4EE-4972-98D2-268E89D5598B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "238FF55F-E3DE-441E-A857-01A3256F5CC4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9.7_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE991696-4495-4EDF-8C77-C23F76F85D07"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9.8_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6113F201-6A7C-483F-9856-1012F61CD2AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9.9a_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A77681F-82C5-460E-BC61-0BF56C7DB547"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9.9b_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "47B599D0-F74C-43CD-ADED-132D64E534E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B2148867-BF1B-4746-B6E7-EE1E4590A2F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9.10_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "02090A42-3240-4BC9-BAE6-809C1CB6E752"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9.11_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2F44CBEE-07CF-4D4B-BD89-9816624D4451"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "970981E9-43DD-4434-9DFD-22B36C8D4386"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.9a_beta:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB034BEA-FE80-420A-8428-3DEE6BBA7323"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:singapore:singapore:0.10.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C3CBBBAF-5CC8-464C-907F-B452668106DA"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securityreason.com/securityalert/1135",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/437716/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27323",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |