mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
196 lines
6.7 KiB
JSON
196 lines
6.7 KiB
JSON
{
|
|
"id": "CVE-2008-2064",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-05-02T23:20:00.000",
|
|
"lastModified": "2017-08-08T01:30:43.590",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple unspecified vulnerabilities in PhpGedView before 4.1.5 have unknown impact and attack vectors related to \"a fundamental design flaw in the interface (API) to connect phpGedView with external programs like content management systems.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades no especificadas en PhpGedView versiones anteriores a 4.1.5, presenta un impacto desconocido y vectores de ataque relacionados con \"a fundamental design flaw in the interface (API) to connect phpGedView with external programs like content management systems.\""
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": true,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.1.4",
|
|
"matchCriteriaId": "B72A5889-BB71-4B29-85F0-54301AC39A97"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2023444-2ED3-493B-BAD4-E1CB35E5AEE1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08CC63D1-93D0-4824-9462-F881D775E3CA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:0.95:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B3E12DB8-EAD0-4F5C-B785-D4C3C24345D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F39A506-086F-4A95-AA7B-44B2CA45D9A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F92B851-F2A2-4BDE-A5D5-FCFEB7737992"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:1.04:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D3E4F77A-FC26-41AB-B5CA-13D433BB5B8D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "395FAED4-94DE-4C7D-AF1B-BE0586189587"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:2.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7F58F44C-F317-4AEF-9394-A18DEE8E52A4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:2.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "52600D9B-44DC-4C5E-9105-F514FD6EF19E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:2.50:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C00EF07-DA5D-4F60-879A-83C3FC376049"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:2.60:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDA13EED-7C5F-4F5E-AEC2-D5DA0206B238"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:2.65:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "12A0E38B-C9E3-4619-B1A1-94C11546D6DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA5AC706-5C75-422A-9C70-09EA3827002B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "328757A4-D90E-46A2-9B4A-AF0F4D5BDFEC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:3.3.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3F1A017B-DC5C-41F6-A489-D37C9223124C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B3442CF0-EBFC-40DD-930C-1EAC1CAF06C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:4.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "30317A7C-91E3-4D25-9A5D-A8F49674C67D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpgedview:phpgedview:4.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BCE3A384-54FC-4672-B395-A73696B64FCB"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://sourceforge.net/project/shownotes.php?group_id=55456&release_id=595222",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2008/dsa-1580",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.phpgedview.net/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/28978",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42085",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |