René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

107 lines
3.1 KiB
JSON

{
"id": "CVE-2005-4026",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-12-05T11:03:00.000",
"lastModified": "2018-09-27T21:39:53.500",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "search.php in Geeklog 1.4.x before 1.4.0rc1, and 1.3.x before 1.3.11sr3, allows remote attackers to obtain sensitive information via invalid (1) datestart and (2) dateend parameters, which leaks the web server path in an error message."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geeklog:geeklog:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.3.0",
"versionEndIncluding": "1.3.11",
"matchCriteriaId": "6195A0F8-DC1D-4239-94C9-4FD35C4EF4E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A08FCCA2-886A-4B8B-B3E5-0A62C8E58B43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11:sr1:*:*:*:*:*:*",
"matchCriteriaId": "B7B2FCD0-5295-4E27-A9AB-4E55CDC4CAF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11:sr2:*:*:*:*:*:*",
"matchCriteriaId": "25E45D9D-ADAF-427F-9B77-FCA02EC0E489"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geeklog:geeklog:1.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7B874DF3-F79C-4AA7-9FDE-3AEF62D3AFF8"
}
]
}
]
}
],
"references": [
{
"url": "http://pridels0.blogspot.com/2005/11/geeklog-14x-full-path-disclosure-vuln.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.geeklog.net/article.php/geeklog-1.3.11sr3",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}