mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
120 lines
4.0 KiB
JSON
120 lines
4.0 KiB
JSON
{
|
|
"id": "CVE-2009-3961",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-11-17T18:30:00.420",
|
|
"lastModified": "2009-11-24T07:04:28.203",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "SQL injection vulnerability in user.php in Super Serious Stats (aka superseriousstats) before 1.1.2p1 allows remote attackers to execute arbitrary SQL commands via the uid parameter, related to an \"incorrect regexp.\" NOTE: some of these details are obtained from third party information."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de inyecci\u00f3n SQL en user.php en Super Serious Stats (tambi\u00e9n conocido como superseriousstats) anteriores a v1.1.2p1 permite a atacantes remotos ejecutar comandos SQL de forma arbitraria a trav\u00e9s del par\u00e1metro \"uid\", relacionado con \"incorrect regexp.\". NOTA: Algunos de los detalles fueron obtenidos de terceras partes."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-89"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.1.2",
|
|
"matchCriteriaId": "E67DC620-75B6-4432-871D-312885277899"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "32A6FFBE-936F-497E-A057-964937F0A8BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D1FB0BA3-7D35-430B-AC9C-82A6770C7AAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0BADEA01-DA2C-4E6F-81BF-0C5D861AE6E7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8718D0DA-9803-4265-8848-54A00055E671"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1D07DAB5-39E0-4758-BD42-7DB4C71D8DC6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E23D3D44-6423-4C3E-8E96-932786D4A610"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://code.google.com/p/superseriousstats/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2009/3175",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |