mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
255 lines
10 KiB
JSON
255 lines
10 KiB
JSON
{
|
|
"id": "CVE-2009-4791",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2010-04-22T14:30:00.463",
|
|
"lastModified": "2018-10-10T19:49:29.277",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple SQL injection vulnerabilities in Family Connections (aka FCMS) before 1.8.2 allow remote attackers to execute arbitrary SQL commands via the (1) letter parameter to addressbook.php, (2) id parameter to recipes.php, (3) year parameter to register.php, (4) poll_id parameter to home.php, and (5) email parameter to lostpw.php."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Multiples vulnerabilidades de inyecci\u00f3n SQL en Family Connections (FCMS) en versiones anteriores a la v1.8.2 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de los par\u00e1metros (1) letter de addressbook.php, (2) id de recipes.php, (3) year de register.php, (4) poll_id de home.php, y (5) email de lostpw.php."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-89"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.8.1",
|
|
"matchCriteriaId": "4AAA6B57-E936-471B-86B8-B10B735614A8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BA509908-BAAB-4FEE-BFCF-66F972284D9E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "24B23881-2C8D-405F-9707-7064CAF2076F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4AF1AE86-FE99-43CA-988A-78CAD57F26DC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5D165CCF-BF8B-4BD8-B1D3-6FA671012555"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5729DE6B-8DE4-461A-8E02-F22C56DE6408"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "212070C7-B670-44EA-9F81-D67F605E944B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C78C3E6D-6D8C-4C7F-A977-7E5966AE2386"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3F85CDEA-DF6E-4B1B-9AF6-9B42228684B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A769ACB2-0A8D-4F6D-858B-D38BC53D00A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AAE7B2DA-20D3-44A4-B34C-9B134A2EB492"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "52B31824-E432-4732-9041-C633F53E994B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A523F1EA-6AF4-465A-BED6-1F8C7D001D56"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A70F3155-0155-45BE-8D35-C13C012E434C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "092B8C26-6628-4910-88C7-903536828F6F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE73C91C-C2DC-499F-B64B-CFA6D0ACF5D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AC06DCA4-36C8-43EA-BE4D-665857C0A58B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09AF2E34-3ACC-4712-8CFC-B215793BB1D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "48BEBA87-8685-4E5B-9A10-ED658BACD020"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "423E786D-1619-4292-BC5E-0B0EE535C3E3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1D658A6A-35FE-44FF-9148-DFBA453D0006"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "150284F5-FB0D-4E09-BEE9-11D037C2C2F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C4EDE49A-40DF-4CAA-8E0A-9D4E88DE67B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B688361-A6A1-41AE-88C1-FD244FCC1E20"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0E4BD989-7EC2-4B0E-B728-BBE13731B5D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3783EA4C-A416-4E68-8C3E-B18CA71359FD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C42088E-ECC8-4BD1-B6CA-9B04896996EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "25107E51-AC63-4E52-972D-5ED8D23863F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D15350F-0283-4CE0-89B9-F8642FE666C2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E76D58EA-FC16-4B2F-9AC5-14431316D0DE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5CD529C5-38D3-43FC-8233-67EF3577AE3D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1027CE9C-C048-4735-A3D4-2C329AD64131"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=672266",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.exploit-db.com/exploits/8319",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.familycms.com/blog/2009/03/fcms-182-released/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/502272/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/34297",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch"
|
|
]
|
|
}
|
|
]
|
|
} |