2024-12-08 03:06:42 +00:00

174 lines
5.9 KiB
JSON

{
"id": "CVE-2007-6319",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-02-19T22:44:00.000",
"lastModified": "2024-11-21T00:39:51.750",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in Lyris ListManager 8.x before 8.95d, 9.2 before 9.2c, and 9.3 before 9.3b allow remote attackers to (1) gain list administrator privileges or (2) access arbitrary mailing lists via unknown vectors related to modification of client-side information; and (3) allow remote authenticated administrators to modify other account data by creating \"new accounts that collide with existing accounts.\""
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades no especificadas en Lyris ListManager 8.x versiones posteriores a la 8.95d, 9.2 versiones posteriores a la 9.2c y 9.3 versiones posteriores a la 9.3b, permiten a atacantes remotos (1) conseguir privilegios de administrador o (2) acceder a listas de correo de su elecci\u00f3n a trav\u00e9s de vectores no conocidos relacionados con la modificaci\u00f3n de la informaci\u00f3n de la parte cliente y (3) permitir a administradores remotos autenticados modificar datos de otra cuenta creando \u201cnuevas cuentas que colisionan con otras ya existentes\u201d"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
},
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lyris:list_manager:8.95:*:*:*:*:*:*:*",
"matchCriteriaId": "73133FFC-F2D6-44FB-A0EB-B8032BE1E45D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lyris:list_manager:8.95a:*:*:*:*:*:*:*",
"matchCriteriaId": "C0A40E4E-E122-49F9-9BBE-D3D147E219AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lyris:list_manager:8.95b:*:*:*:*:*:*:*",
"matchCriteriaId": "B50A3C7E-7BD3-4811-A48B-C1DE1FA2290D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lyris:list_manager:8.95c:*:*:*:*:*:*:*",
"matchCriteriaId": "1723FC6E-0A53-444A-8FB1-DAB0F8C0F95F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lyris:list_manager:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "666997DC-6DFC-4E69-B756-73AC512744EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lyris:list_manager:9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD4E440-95BB-4B79-A6C1-D5B7E2D9E2D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lyris:list_manager:9.2b:*:*:*:*:*:*:*",
"matchCriteriaId": "BD10C9A9-7F4E-4177-BD91-297EBCF70A30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lyris:list_manager:9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "03038BF0-4B6D-4E54-8D94-70CF0AC9CCE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lyris:list_manager:9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "A484B37E-8DB3-405B-863A-A3D4ECE1AEF2"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/29019",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/3671",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1019436",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/488343/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/26792",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/0618",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/29019",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securityreason.com/securityalert/3671",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securitytracker.com/id?1019436",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/488343/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/26792",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/0618",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}