mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
242 lines
8.9 KiB
JSON
242 lines
8.9 KiB
JSON
{
|
|
"id": "CVE-2010-2859",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2010-07-25T02:04:14.907",
|
|
"lastModified": "2018-10-10T20:00:07.687",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "news.php in SimpNews 2.47.3 and earlier allows remote attackers to obtain sensitive information via an invalid lang parameter, which reveals the installation path in an error message."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "news.php en SimpNews 2.47.3, y versiones anteriores, permite a atacantes remotos obtener informaci\u00f3n sensible mediante un par\u00e1metro lang inv\u00e1lido, lo que revela la ruta de instalaci\u00f3n en un mensaje de error."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.47.03",
|
|
"matchCriteriaId": "57B891F3-1B6D-4039-BF4D-E4D6F3AB6FDC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8CADEFF-8D12-4308-9C2A-F37AE60DC499"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D37D1345-2566-417F-88A3-4B8DADB6161D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.30:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "525D4258-6B60-4902-A0EF-B6E3BDBC1875"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.30.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C35A9176-BF2E-43C2-BD36-3F583362DAF5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.30.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "35ECC5A8-CCCC-4E1E-875E-FC0D28AD964D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.31.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BAD35679-9229-4A35-8638-56C7B110FEE3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.32.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09F7499C-C884-4770-A112-D5FE69B5C55B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.32.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3744273B-0CDC-4DBF-807F-8614CC0C1A66"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.33.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6224286D-47EE-4F2E-80DF-9ACDB54A3E24"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.33.01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E1C4FFA6-3DC6-4139-983C-5B112F7779BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.34:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "83F2C8B0-C422-4504-88A9-597433D79452"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.34.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD3E663C-875D-4F3C-985C-DC81314859AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.34.01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EB2DCF08-B334-49F3-BF9D-11A07658F844"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.35.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2BE4191A-F0F5-496A-850E-03D8C76463C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.36.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A3355919-74E6-4875-82E7-2BCCCC2D7444"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.37.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17CF2904-694A-4B4F-8A3C-94B6A4F17897"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.37.01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "655848C4-060B-46ED-8151-8A5C275AAF53"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.37.02:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2F66B4A-DB1D-4D30-A05C-A015F2454949"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.38:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "55C91B08-1352-48D8-87B6-EC5D8FFACA2A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.38.02:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B3B1AF1-9F9D-4740-9974-94677588821D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.38.03:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "780E0AA5-F5D8-409E-8EA1-96936127DB91"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.38.04:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0B54AD3F-C179-4208-A671-1D042D4B5B35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.39.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7333ECDA-75E1-4A3E-8E38-5AB007E43757"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.40.01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D0AD0E0D-C78F-4150-8EE7-FA13D6B259BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.41.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51FDD925-6E20-4C34-94B3-3F7B66CE1091"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.41.02:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DBE88F68-D48F-4A34-BBA3-094AA24CB846"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.41.03:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0C36114C-FB58-461A-845C-E49A4633B65E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.42.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B3A9534-C955-441F-8D0D-28E8C86D0936"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.42.01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "163E21A7-F4B2-46AF-AAF6-7450C5D68F42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.44.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B9B43B1-5E68-431F-A0A0-ABD1341CDFE4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:boesch-it:simpnews:2.47.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC72F4DE-1D7B-4212-AA9E-E764004C5109"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://packetstormsecurity.org/1007-exploits/simpnews-xss.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/512271/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |