René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

120 lines
4.0 KiB
JSON

{
"id": "CVE-2009-3961",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-11-17T18:30:00.420",
"lastModified": "2009-11-24T07:04:28.203",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in user.php in Super Serious Stats (aka superseriousstats) before 1.1.2p1 allows remote attackers to execute arbitrary SQL commands via the uid parameter, related to an \"incorrect regexp.\" NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en user.php en Super Serious Stats (tambi\u00e9n conocido como superseriousstats) anteriores a v1.1.2p1 permite a atacantes remotos ejecutar comandos SQL de forma arbitraria a trav\u00e9s del par\u00e1metro \"uid\", relacionado con \"incorrect regexp.\". NOTA: Algunos de los detalles fueron obtenidos de terceras partes."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.1.2",
"matchCriteriaId": "E67DC620-75B6-4432-871D-312885277899"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "32A6FFBE-936F-497E-A057-964937F0A8BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D1FB0BA3-7D35-430B-AC9C-82A6770C7AAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0BADEA01-DA2C-4E6F-81BF-0C5D861AE6E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "8718D0DA-9803-4265-8848-54A00055E671"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D07DAB5-39E0-4758-BD42-7DB4C71D8DC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jos_de_ruijter:superseriousstats:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E23D3D44-6423-4C3E-8E96-932786D4A610"
}
]
}
]
}
],
"references": [
{
"url": "http://code.google.com/p/superseriousstats/",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/3175",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}