René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

208 lines
7.6 KiB
JSON

{
"id": "CVE-2007-1395",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-03-10T22:19:00.000",
"lastModified": "2018-10-16T16:38:22.313",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Incomplete blacklist vulnerability in index.php in phpMyAdmin 2.8.0 through 2.9.2 allows remote attackers to conduct cross-site scripting (XSS) attacks by injecting arbitrary JavaScript or HTML in a (1) db or (2) table parameter value followed by an uppercase </SCRIPT> end tag, which bypasses the protection against lowercase </script>."
},
{
"lang": "es",
"value": "Vulnerabilidad de lista negra incompleta en index.php en phpMyAdmin 2.8.0 hasta 2.9.2 permite a atacantes remotos llevar a cabo ataques de secuencias de comandos de sitios cruzados (XSS) por inyecci\u00f3n de JavaScript de su elecci\u00f3n o HTML en un valor par\u00e1metro (1)db o (2) table seguido de una etiqueta de fin \"may\u00fascula\" </SCRIPT>, la cual evita la protecci\u00f3n contra la \"min\u00fascula\" </script>."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "60F2B3C2-0EDB-48D3-92BC-B1CA0E41F230"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9852676-A91F-4FD6-A734-BF7E048411FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FC64B22B-E415-4510-A0DF-CE4763A423D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "12375469-DD81-42BE-8BC0-FCAB0D2D6253"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FCEF6246-C393-41BE-BABC-840585795D53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.1_dev:*:*:*:*:*:*:*",
"matchCriteriaId": "E384B8D4-C72C-4D3D-A25F-26FB5F1D4B89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2ACC829-CF64-4F20-8827-AA95002A6F5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "05D4C98E-D127-40EB-BE71-A6BB91D4392C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4C26B2DE-669F-4F79-99AE-3210662AAB85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E4B64201-5B5B-4D22-B341-C601DC54BFB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "44DA3E88-1572-484D-A4DB-A99EF7D73129"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E65F392-A841-461A-921C-91F40330F3F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5A7F2F4E-7DCC-43F8-BB69-BE553C2F8F66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1CDE3326-8B3F-4C3A-BA40-6F91CDFAFA76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_beta1:*:*:*:*:*:*:*",
"matchCriteriaId": "36C4A673-5ACD-4D1A-A780-5CD279230051"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_dev:*:*:*:*:*:*:*",
"matchCriteriaId": "0534C39C-A421-4C97-8A96-A74ABFA78B92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BD0DFB0-92F1-4914-A637-A2EBCE0A9BCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E6354257-6B1A-4729-9EE2-19D3CD2AD62B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4686B445-3843-4173-8565-16BF364EF911"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "1519A451-0EC8-4718-991D-948572C08410"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "9ACAA116-2853-456B-BC9C-B036A0F99FB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A8AF5A1A-328E-43A1-8C41-0DAB1F337FA6"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/2402",
"source": "cve@mitre.org"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:199",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/462139/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.us.debian.org/security/2007/dsa-1370",
"source": "cve@mitre.org"
},
{
"url": "http://www.virtuax.be/advisories/Advisory2-24012007.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32858",
"source": "cve@mitre.org"
}
]
}