mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
114 lines
3.4 KiB
JSON
114 lines
3.4 KiB
JSON
{
|
|
"id": "CVE-2005-4148",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2005-12-10T11:03:00.000",
|
|
"lastModified": "2018-10-19T15:40:26.877",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Lyris ListManager 8.5, and possibly other versions before 8.8, includes sensitive information in the env hidden variable, which allows remote attackers to obtain information such as the installation path by requesting a non-existent page and reading the env variable from the resulting error message page."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lyris_technologies_inc:listmanager:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EA7692A2-BC9A-4F87-B124-A2E7F3376E27"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lyris_technologies_inc:listmanager:6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA9383A8-69A0-4398-95AB-C8E723AD857A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lyris_technologies_inc:listmanager:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E26CB041-073B-45DF-9E69-3835564E6006"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lyris_technologies_inc:listmanager:8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4FE562AE-94D6-4C62-B149-AC79390D4BE1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lyris_technologies_inc:listmanager:8.8a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9715CA02-81AE-4F85-B0F7-CE100A74D2D2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0349.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://metasploit.com/research/vulns/lyris_listmanager/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/419077/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/15789",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2005/2820",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |