mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
158 lines
5.6 KiB
JSON
158 lines
5.6 KiB
JSON
{
|
|
"id": "CVE-2009-0752",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-03-03T00:30:00.267",
|
|
"lastModified": "2009-03-04T05:00:00.000",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in Movable Type Pro and Community Solution 4.x before 4.24 has unknown impact and attack vectors, possibly related to the password recovery mechanism."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad sin especificar en Movable Type Pro y Community Solution v4.x anteriores a v4.24 cuyo impacto y vectores de ataque se desconocen, pero que, posiblemente, est\u00e9n relacionados con el mecanismo de recuperaci\u00f3n de contrase\u00f1as."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": true,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.0:-:community_solution:*:*:*:*:*",
|
|
"matchCriteriaId": "B4FEB07E-4D70-4A24-822E-E4689CB8C9CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.0:-:pro:*:*:*:*:*",
|
|
"matchCriteriaId": "59457028-2EA4-472F-A76F-EF867F48937F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.01:-:community_solution:*:*:*:*:*",
|
|
"matchCriteriaId": "ABE24C88-6062-4A36-9852-D9EC818EEA0E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.1:-:community_solution:*:*:*:*:*",
|
|
"matchCriteriaId": "11C793FA-AE7C-430F-B537-19B788D9BC6E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.1:-:pro:*:*:*:*:*",
|
|
"matchCriteriaId": "F80A607A-66A8-4995-A396-5487B8E3029C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.01:-:pro:*:*:*:*:*",
|
|
"matchCriteriaId": "C3C21088-A9A5-4CE2-B4D7-8BC48DB84540"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.01:b:community_solution:*:*:*:*:*",
|
|
"matchCriteriaId": "C1DCAD70-9FFF-4950-875D-586937E93473"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.01:b:pro:*:*:*:*:*",
|
|
"matchCriteriaId": "395B9CE4-EA3A-42A1-AD37-6487911E10D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.2:-:community_solution:*:*:*:*:*",
|
|
"matchCriteriaId": "448081A9-A8C9-4FEC-879B-7FA11997B4D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.2:-:pro:*:*:*:*:*",
|
|
"matchCriteriaId": "E7538776-B7B2-4912-BFE3-E7A1033F41E4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.12:-:community_solution:*:*:*:*:*",
|
|
"matchCriteriaId": "F33F4F69-D670-4698-84C6-EDD9D78F2D9C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.12:-:pro:*:*:*:*:*",
|
|
"matchCriteriaId": "1E481C6C-F6EF-4E7D-8DAF-F68407DE6501"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.21:-:community_solution:*:*:*:*:*",
|
|
"matchCriteriaId": "23B5D056-BC56-4851-8E76-7E22C911EEFD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.21:-:pro:*:*:*:*:*",
|
|
"matchCriteriaId": "CA9BC769-BE45-42EC-8E35-02E6B216D6E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.23:-:community_solution:*:*:*:*:*",
|
|
"matchCriteriaId": "9A1B400B-FEC9-416B-89F2-C96B1BE11BF8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sixapart:movable_type:4.23:-:pro:*:*:*:*:*",
|
|
"matchCriteriaId": "1458F0E9-6AF1-44C6-B0EC-7BCF314B0038"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.movabletype.com/blog/2009/02/movable-type-424-get-updated-with-better-password-recovery.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |