René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

123 lines
3.6 KiB
JSON

{
"id": "CVE-2002-0483",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-08-12T04:00:00.000",
"lastModified": "2008-09-05T20:28:08.650",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "index.php for PHP-Nuke 5.4 and earlier allows remote attackers to determine the physical pathname of the web server when the file parameter is set to index.php, which triggers an error message that leaks the pathname."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93B755A9-694E-49FA-9068-353203AF9965"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CA0B88AD-CACF-4E48-A4B1-313FFE32D058"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF4C3F85-A23C-40B9-9B0F-564E7C254AA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4EAF55C4-F0A7-4A36-B203-83670D58483F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "E3ED3BFC-C8CF-4537-832C-0D00400AC064"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C94B62CA-8D34-4B37-8748-1FE64F0299DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8720AE61-41C7-4EA8-8C01-81AC0BFACBCC"
}
]
}
]
}
],
"references": [
{
"url": "http://online.securityfocus.com/archive/1/263337",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.iss.net/security_center/static/8618.php",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/4333",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}