René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

153 lines
4.7 KiB
JSON

{
"id": "CVE-2008-4178",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-09-23T15:25:42.813",
"lastModified": "2017-09-29T01:32:02.460",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in tr.php in DownlineGoldmine Special Category Addon, Downline Builder Pro, New Addon, and Downline Goldmine Builder allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en tr.php para DownlineGoldmine Special Category Addon, Downline Builder Pro, New Addon, y Downline Goldmine Builder que permite a los atacantes remotos ejecutar arbitariamente comandos SQL a trav\u00e9s del par\u00e1metro id. NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceros."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:downline_goldmine:builder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DE9CE32-AAA6-4EC0-AB77-896FD84FBB3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:downline_goldmine:builder:special_category_addon:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD0CC04-097F-4455-995E-BC82723F46ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:downline_goldmine:builder:unknown:unknown:pro:*:*:*:*:*",
"matchCriteriaId": "49C85BB9-3E89-4D3D-BC7D-04DB53E40216"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:downline_goldmine:new_addon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB86E912-0A05-4337-B573-B2E5EA3ACCE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:downline_goldmine:new_addon:pro:*:*:*:*:*:*:*",
"matchCriteriaId": "5BE9D3ED-5EB3-4190-9A7C-46299368E3A6"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/categoryaddon-sql.txt",
"source": "cve@mitre.org"
},
{
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/31169",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2992",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2993",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2994",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2995",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45128",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/6946",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/6947",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/6950",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/6951",
"source": "cve@mitre.org"
}
]
}