mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
101 lines
3.2 KiB
JSON
101 lines
3.2 KiB
JSON
{
|
|
"id": "CVE-2006-6852",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-12-31T05:00:00.000",
|
|
"lastModified": "2011-03-08T02:47:10.330",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Eval injection vulnerability in tDiary 2.0.3 and 2.1.4.200 61127 allows remote authenticated users to execute arbitrary Ruby code via unspecified vectors, possibly related to incorrect input validation by (1) conf.rhtml and (2) i.conf.rhtml. NOTE: some of these details are obtained from third party information."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de inyecci\u00f3n de secuencias de entrada evaluables en tDiary 2.0.3 y 2.1.4.200 61127 permite a atacantes remotos autenticados ejecutar c\u00f3digo Ruby de su elecci\u00f3n mediante vectores no especificados, posiblemente referidos a validaci\u00f3n de entrada incorrecta en (1) conf.rhtml y (2) i.conf.rhtml. \r\nNOTA: algunos de estos detalles se han obtenido de informaci\u00f3n de terceros."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 6.8,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tdiary:tdiary:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "901E2D28-D124-4633-918B-CDB0EA08C8A2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tdiary:tdiary:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A7D4A716-2D1B-47F0-BB24-EC8364CCD5FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tdiary:tdiary:2.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD08310D-FF5A-4CFB-866C-9B7308230783"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://jvn.jp/jp/JVN%2331185550/index.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/21811",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.tdiary.org/20061210.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/5201",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |