mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
168 lines
5.7 KiB
JSON
168 lines
5.7 KiB
JSON
{
|
|
"id": "CVE-2008-3268",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-07-24T15:41:00.000",
|
|
"lastModified": "2024-11-21T00:48:50.990",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in phpScheduleIt 1.2.0 through 1.2.9, when useLogonName is enabled, allows remote attackers with administrator email address knowledge to bypass restrictions and gain privileges via unspecified vectors related to login names. NOTE: some of these details are obtained from third party information."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad no especificada en phpScheduleIt de 1.2.0 a 1.2.9, cuando useLogonName est\u00e1 habilitado, permite a atacantes remotos que conocen direcciones de email de administradores evitar las restricciones y obtener privilegios mediante vectores no especificados relacionados con nombres de login. NOTA: algunos de estos detalles se han obtenido \u00fanicamente de informaci\u00f3n de terceros."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"baseScore": 6.8,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:brickhost:phpscheduleit:1.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7663D802-7547-4FE0-B5A3-D20B18ADB6E9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:brickhost:phpscheduleit:1.2.0:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D69ADD45-37E8-480F-8C06-3295A9BB5B78"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:brickhost:phpscheduleit:1.2.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC0D9466-E7BD-4D1C-9AFA-596198A5B65E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:brickhost:phpscheduleit:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CFB149A8-0B97-438B-8351-91446232D500"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:brickhost:phpscheduleit:1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1FCC62CE-E455-449C-A03E-23C97D834143"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:brickhost:phpscheduleit:1.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3019FB4F-E2E1-4E4B-B537-F6E12262950B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:brickhost:phpscheduleit:1.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5D209B2F-11D9-4C66-AA9D-ABF706B436A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:brickhost:phpscheduleit:1.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "82A187A7-6985-464C-B9E5-81FFB815261D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:brickhost:phpscheduleit:1.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F79B653B-9D13-4B72-83EB-E3DB806B815B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:brickhost:phpscheduleit:1.2.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B218350-9512-4C0A-9BDD-3DF7CE26921E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:brickhost:phpscheduleit:1.2.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0CDB5CB2-19E6-4CF9-90A5-44FC4E1CC683"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://secunia.com/advisories/31147",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=614202",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/30300",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43900",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/31147",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=614202",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/30300",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43900",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |