René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

112 lines
3.6 KiB
JSON

{
"id": "CVE-2005-2259",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-07-13T04:00:00.000",
"lastModified": "2008-09-05T20:51:18.053",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The dispallclosed2 function in dispallclosed.pl for multiple USANet Creations products, including (1) USANet Shopping Mall Software, (2) Domain Name Auction Software, (3) Standard Classified Ads Software, and (4) MakeBid Reverse Auction allows remote attackers to execute arbitrary code via shell metacharacters in the DISPCLOSED parameter."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:usanet_creations:domain_name_auction:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D77AED-73EF-4375-B1C0-E80502B86563"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:usanet_creations:makebid_auction_deluxe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A720DA2C-10D8-467A-B375-665CFFC4198F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:usanet_creations:makebid_auction_deluxe:3.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C9AE346F-60CA-4B6F-A627-423FBF555460"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:usanet_creations:makebid_auction_standard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "39B040E0-C50A-419F-9DB4-E1D9467EEAC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:usanet_creations:makebid_reverse_auction:*:*:*:*:*:*:*:*",
"matchCriteriaId": "55B80B42-B16A-4DDF-B871-B687B1F26CCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:usanet_creations:standard_classified_ads:*:*:*:*:*:*:*:*",
"matchCriteriaId": "18BAEB16-830A-4E2C-B4E3-F27F3BFA66C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:usanet_creations:usanet_shopping_mall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8002F5A8-7CAC-4BEA-AFE4-0E4A2E786068"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1014411",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/14179",
"source": "cve@mitre.org"
}
]
}