mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
185 lines
6.5 KiB
JSON
185 lines
6.5 KiB
JSON
{
|
|
"id": "CVE-2008-5791",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-12-31T11:30:00.390",
|
|
"lastModified": "2017-08-08T01:33:32.267",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple unspecified vulnerabilities in PrestaShop e-Commerce Solution before 1.1 Beta 2 (aka 1.1.0.1) have unknown impact and attack vectors, related to the (1) bankwire module, (2) cheque module, and other components."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades sin especificar en PrestaShop e-Commerce Solution anterior a v1.1 Beta 2 (tambi\u00e9n conocida como v1.1.0.1), tiene un impacto y vectores de ataque desconocidos relacionados con los m\u00f3dulos (1) bankwire y (2) cheque as\u00ed como con otros componentes."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": true,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.0",
|
|
"matchCriteriaId": "6DA16E87-B2A5-48B2-A3A3-AFE38599F525"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:0.8.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4A787D70-3C0B-48B9-AC28-C43D93048756"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:0.8.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "816F93A5-6513-4857-8FC9-2B27A584C183"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:0.8.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "02AEFA3E-CA70-490B-AEF4-D3F63A85F0B8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:0.8.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2DCA3511-BCA4-4A33-8498-2BD2E87E897F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:0.8.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "82C16D46-5809-4EAE-B633-B2B00DDD98AF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:0.8.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CCC8056C-1225-4473-84CE-E81D2300B3FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "54EDD2D3-1F4B-4086-AB45-95CBFEBF366B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:0.9.1:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE1B6EB6-B861-48FC-AF8F-1B0E6984F0E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:0.9.1:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "721D0EE5-8E4A-49B6-8CDB-F6C009426957"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:0.9.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57F59F4F-8542-404E-BEA9-E7458E8545C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:0.9.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D1CD639-A779-4719-8FA3-8CD6D04BCC45"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:0.9.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0DC571AA-23A4-4FFA-9B5A-142B52C52D0F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:0.9.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDC994F4-6BB4-4157-9127-5BDA59198A61"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:1.0.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07A283FD-CF6B-4BF1-BDD0-D58B2D4BA9F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:1.0.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1FC46D61-2E72-488B-B4D3-5790C4C4DEC7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:1.0.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "52A2BB6A-F24B-45B5-A15B-74AB4027DCC2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:1.0.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "37838F2C-30C5-48E1-8C16-226BB4C7702B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:prestashop:prestashop:1.0.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ED69764D-EECF-4B3D-BA21-F233657C73B4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=638105",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.prestashop.com/download/changelog_1.1.0.1.txt",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/32184",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46425",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |