mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
189 lines
6.3 KiB
JSON
189 lines
6.3 KiB
JSON
{
|
|
"id": "CVE-2008-6506",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-03-23T16:30:00.187",
|
|
"lastModified": "2017-08-17T01:29:20.897",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in phpBB before 3.0.4 allows attackers to bypass intended access restrictions and activate de-activated accounts via unknown vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad no esp\u00e9cificada en phpBB anteriores a v3.0.4 permite a atacantes saltarse las restricciones de seguridad y activar cuentas desactivadas, a trav\u00e9s de vectores desconocidos.\r\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": true,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.0.3",
|
|
"matchCriteriaId": "AF8238B0-BEED-4B7C-8431-622A69D25E3D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "60480BCC-6784-4A12-BBAC-A98181A362F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6637E3D8-FBBA-45EF-ADCF-CFA5CF924069"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "60B63076-D942-46B8-96DA-DD2ED812FCA9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7924312D-46E8-456B-B920-36E33A719945"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:2.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D08D3F47-E8FA-4FEC-A3D5-B01B0C1862D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:2.0.22:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2F959028-8C40-4341-A9EB-BFE9C8951111"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:2.01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "474A1EF7-AD8A-49B3-A629-5917081FB0AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF122E0D-ABB7-4042-A127-B061CD1F1165"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EFEFD3F1-87C7-45B9-B524-FF6DDD474C00"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F9A1BA2-583C-4FFB-8E31-7F89EDC0A5AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87E212D1-431B-4595-B0BF-520AE07A4A9E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E5876E29-AFE1-4351-842F-C20055CB68CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F08C7C49-7B1F-4C0D-BACF-6B80D25DA75C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "84BBDC01-58AA-4F1C-B5AD-5697AD538D8E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF7CD162-BAF6-43ED-B8B0-1D9C272BFCB9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3F75B66A-E334-4019-B09D-C5FC21329CF8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:3.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE94F5A1-2850-4C32-8D77-9E601076C2B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:phpbb:phpbb:3.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "85EF28FC-7EA3-4BC6-9997-8B90721C61CC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2009/02/06/2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.phpbb.com/community/viewtopic.php?f=14&t=1352565",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.phpbb.com/support/documents.php?mode=changelog&version=3#v303",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/32842",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47370",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |