mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
691 lines
28 KiB
JSON
691 lines
28 KiB
JSON
{
|
|
"id": "CVE-2009-1526",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-05-05T20:30:00.297",
|
|
"lastModified": "2024-11-21T01:02:40.337",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "JBMC Software DirectAdmin before 1.334 allows local users to create or overwrite any file via a symlink attack on an arbitrary file in a certain temporary directory, related to a request for this temporary file in the PATH_INFO to the CMD_DB script during a backup action."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "JBMC Software DirectAdmin anterior a v1.334 permite a usuarios locales crear o sobreescribir cualquier fichero a trav\u00e9s de un ataque de enlace simb\u00f3lico en un directorio temporal concreto, relacionada con una petici\u00f3n para ese fichero temporal en PATH_INFO en la secuencia de comandos CMD_DB durante una acci\u00f3n de copia de seguridad."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"baseScore": 6.9,
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 3.4,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-59"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.333",
|
|
"matchCriteriaId": "B768ED82-8524-4A8A-8870-150B4B2070A0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:0.95:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "950B6C5B-8864-4248-BFE2-3559CEBCEAD8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5A7A412F-D5D3-4835-B496-931867BE2F2A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E9F46CD-7BCB-4230-85DE-423FD56CBB68"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F3E73F85-C632-4FCE-8E0E-D43057F7F2D4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.02:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9BF52D95-BBF9-4433-A7CA-938F663BBF8E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D4D38930-9C2B-4C1E-A60E-2A01751E6962"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "684EA453-9B2F-4DC6-B352-33E9FF1D059E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.03:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F667CC1-B49B-4F1D-9D7F-BA9EA0B358B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.04:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1EC670D6-4E3C-4911-BD82-5615029FF7D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.05:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F7AD7550-22EB-4AFB-AFEA-AEAE67DA5D22"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.06:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AED4E43C-23C6-4FA7-BE9E-F2B680ACEDA7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.07:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3B871B01-7F60-42D3-A935-C8FAE964B742"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.08:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DA0BCB5A-FDDD-43BB-9837-F8A99AF3C840"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.09:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F6003B88-A67E-4DF3-B79A-3DA3FE4B232E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80AE9A2B-1A17-44C7-960F-6C44F54E499B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C7A40F1-8099-45A9-B583-5DCD9418EEC1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A777926-1C6D-4815-9AD5-BB0187240DDE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC5D92DD-3FBA-4E61-A225-4533340F5E2F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E38AFB57-3C20-40F4-9B2A-48A54618A95A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "118EE3CB-8379-4596-A123-97E27E4755D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3B9678BF-0C83-42B3-AF53-B5C03E876F80"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6385C7C5-7FD5-482A-ADDB-A7253949D8B0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.19:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "484B6212-6A45-4294-8D3C-FDAE8263FDEB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.21:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9EBE1E56-DD19-434B-9269-2CD4881A8CB0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.22:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1FD2FA1E-A4F7-4EDA-B976-6587E8FAE599"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.23:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3EC562EE-048A-49D7-9F1B-A2BA6ABB30AE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.24:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C845A416-F58A-4ADB-81E9-A873052CD9CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.25:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "64BDDF62-9CBC-4AB7-BEBC-0FABDC4DF2F5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.26:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "01B46A2D-7333-497C-90D8-C73088682C87"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.27:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7336ABAE-8274-478F-9807-BF6F622D2805"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.28:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C414DDF6-95B8-469B-B604-94B9C585EAAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.29:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D1020F89-5184-4786-8506-C049213522F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.31:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E83CBC81-74F8-4880-8BF8-A248C2978329"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.32:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "81656A6B-A30A-415E-8212-FDE8A4BE7F14"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.33:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FBC6DA4C-4EA7-4A34-999F-E6EEA1187A31"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.081:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59A80A97-600A-4014-BE17-3704AF17EB10"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.111:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FCAC483-220A-4A77-9947-DF9364038889"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.121:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE419366-9394-4CA7-A55B-AFE4581E9784"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.151:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5D135322-8410-485D-8D08-26C3D1E5F28D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.152:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16A5AE38-893B-41E3-951F-3D5816F57865"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.161:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "620907FD-D1E8-4B49-BA15-6CBDA20A3CAA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.171:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B468D79-6AFA-404F-AB78-321A3C0FF2D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.172:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C014925-8D2A-463B-8241-27DE59117325"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.173:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7CCC9CF-40B0-4B21-BA39-2F426566DC41"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.174:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B979554A-1BC6-4E10-A293-A173D2A99954"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.181:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11D32A32-5E67-43E3-B4B9-A0688894FC5E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.192:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E172E4C-02EF-441D-9D24-32CC2757A0F1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.193:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "48430BB0-0012-4C99-ACB8-7F20FE211763"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.195:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "79F416BB-FB79-4F47-BC40-6B6FB4A689FC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.196:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DAEF5026-014D-4BCB-AC71-D70B09B8B98A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.201:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "64A68763-3A6E-4B6D-AAB0-8052D8020C7F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.202:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5F8D00D6-C972-4474-8DE8-CF37F2E371ED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.203:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7F136A16-A7C7-4A83-8D4D-BB8ADEDCA25E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.204:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B969866-0DA1-4FF6-B481-8294368D2465"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.205:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C21BD781-F02C-499D-85CD-AF95B76F5267"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.206:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "085694D2-F999-4054-AE4F-13E75E1670CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.207:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D49B376-0F3E-4DC4-B132-F28670A0EEED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.211:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9540CD99-37B0-433C-BD6B-76CF4B7A4039"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.212:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "968B35D0-89FD-4442-8F58-A2737091293E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.213:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "483AE214-5602-4B41-B516-20328C5F728C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.221:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5DF4CD9C-A504-4B42-8341-76DD11B8BE09"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.222:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1AA2F0D1-66AE-43B1-A864-86EAB01AE0B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.223:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5A3761B7-DA83-40A6-AAF1-7FD7F9012C6A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.224:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C69A38A8-434F-490F-8ACD-8C9707F90C72"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.225:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EAD23827-F6DE-4687-86C1-835C788D3CA8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.226:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "93A8E1AC-6AB9-4CDC-B1F1-B120B8F11F44"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.231:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B681B118-70C1-476C-9251-64643D9CF200"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.232:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EEEBBCB1-7D88-4E02-BC36-D88A5B2DEFF6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.233:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FBA16933-AAC0-4DE2-8860-8991ED65D207"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.234:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3B4851D2-8EBE-4520-A1DF-379F78F1FFEF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.235:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "149F2DE3-9D5A-42FE-A7FF-EFE4106BE471"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.241:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C780A435-BB3E-4990-85D7-94E48A11D9B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.242:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2F3F4ED-ED64-4147-B24E-D9E019321097"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.243:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A178CCE4-3880-42C4-BE11-6F8E7766B35C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.244:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D083974F-1533-4E1C-A7AD-C3217987783F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.251:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "497D4932-C82B-40CE-8A6A-CA3874964C8D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.252:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F19AF8A4-F9B6-4256-A079-9BD44BE44EED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.253:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0B724438-B83B-43D2-B9F3-2967EE51D860"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.254:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "39E4EA93-CA34-462B-BD57-5388906331E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.255:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F0D5DDB1-5E2B-4EB8-B883-21302FEC0574"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.261:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "423D2B7B-F50C-43FA-8CAB-320D0E8CC327"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.262:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3E5EA035-B7C1-4D2C-8D54-40F51CC385B0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.263:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D56B6FC1-662A-4F65-A4DF-D83FDC3B8A19"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.264:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "03E7ABAC-E97D-48F5-B279-922675D7A46F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.265:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9486749-DA99-4937-8F24-4BA75DD131FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.266:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D034435F-401F-47E7-A9AC-9A803C289F92"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.273:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0879D0C9-D397-4EFA-96D3-F6923966AA6A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.274:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9582E5D-6924-4707-91B0-F395121A5F93"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.275:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "701FDD8C-B7C9-43D0-AE06-BEFFD3A7822E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.281:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C86CB562-1BDE-4238-8C88-F1D735BAC6E3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.282:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CC755D99-DA7E-4590-B747-A6EAFE7EE872"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.285:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "15F969FE-243B-4015-84FF-E3490BAC0BED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.286:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D93E5BF7-6E1B-474C-AABF-71FC548CB828"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.291:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A23A9476-A56F-4D60-9F04-645B16840A55"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.292:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "154CC305-820A-4079-85A2-2C6E3AE26598"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.293:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E98D3D2-C999-4134-B34D-7278E52C8385"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.294:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "82D70C90-4D03-423B-B499-EB368049A5BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.295:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BDE26A64-F441-4724-99AF-4D94D741B070"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.296:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD0E5D29-A3B7-49A6-AC4E-38F0233611EF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.297:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0FF7F89C-D4DD-4058-9A9F-B7B976DFAB47"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.301:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD6B81BC-A032-4964-8F13-C485F160DE9F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.302:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D49EFEB2-1F4B-4CA7-A082-20F41B980987"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.311:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "75726460-6DB3-48B7-B984-46F45953FEFB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.312:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B4D90A0-46AF-4D3C-8601-23AAE919AC95"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.313:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "199447EB-E134-42C7-B4D4-3A89A50F2CC3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.314:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "54E4AF59-9EBE-495E-936B-EED2BC213919"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.315:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CEBB2E15-C99F-4293-AB93-51987A476068"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.321:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D0188D54-45F0-4F35-8A73-76D90777C9A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.322:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B233AFD7-DFD0-4D28-8109-95E913918F08"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.323:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7C36E7E-6D3A-4222-A35F-E72B9DA2191C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.331:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4900B370-4CF1-4E77-BDBD-374BAA01C61B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.332:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F9C9E06A-39E6-4062-AB43-559396829107"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.1741:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57313039-6B37-4DF9-85F0-77B97F187AF5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jbmc-software:directadmin:1.1941:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "36F381A8-406E-46DB-9276-7E4284BFA44A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0228.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/54014",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/34861",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.directadmin.com/features.php?id=968",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0228.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/54014",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/34861",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.directadmin.com/features.php?id=968",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |