Vulnerabilites related to oscommerce - osc2nuke
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
francisco_burzi | php-nuke | 5.0 | |
francisco_burzi | php-nuke | 5.0.1 | |
francisco_burzi | php-nuke | 5.1 | |
francisco_burzi | php-nuke | 5.2 | |
francisco_burzi | php-nuke | 5.2a | |
francisco_burzi | php-nuke | 5.3.1 | |
francisco_burzi | php-nuke | 5.4 | |
francisco_burzi | php-nuke | 5.5 | |
francisco_burzi | php-nuke | 5.6 | |
francisco_burzi | php-nuke | 6.0 | |
francisco_burzi | php-nuke | 6.5 | |
francisco_burzi | php-nuke | 6.5_beta1 | |
francisco_burzi | php-nuke | 6.5_final | |
francisco_burzi | php-nuke | 6.5_rc1 | |
francisco_burzi | php-nuke | 6.5_rc2 | |
francisco_burzi | php-nuke | 6.5_rc3 | |
francisco_burzi | php-nuke | 6.6 | |
francisco_burzi | php-nuke | 6.7 | |
francisco_burzi | php-nuke | 6.9 | |
francisco_burzi | php-nuke | 7.0 | |
francisco_burzi | php-nuke | 7.0_final | |
francisco_burzi | php-nuke | 7.1 | |
francisco_burzi | php-nuke | 7.2 | |
francisco_burzi | php-nuke | 7.3 | |
oscommerce | osc2nuke | 7x_1.0 | |
paul_laudanski | betanc_php-nuke | bundle | |
trustix | secure_linux | 2.0 | |
trustix | secure_linux | 2.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "93B755A9-694E-49FA-9068-353203AF9965", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA0B88AD-CACF-4E48-A4B1-313FFE32D058", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FF4C3F85-A23C-40B9-9B0F-564E7C254AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "4EAF55C4-F0A7-4A36-B203-83670D58483F", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.2a:*:*:*:*:*:*:*", "matchCriteriaId": "E3ED3BFC-C8CF-4537-832C-0D00400AC064", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C94B62CA-8D34-4B37-8748-1FE64F0299DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "8720AE61-41C7-4EA8-8C01-81AC0BFACBCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "2F6E1577-6E50-49E2-B968-8C2AA924142F", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CA9AE983-B6FF-4686-BDB3-E6B12D4E853E", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "91CC84AB-0BA6-45BE-9DE8-7243FBF00EB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "23264211-2992-4222-9B96-5ABEE1332C5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "B7F76C32-E24D-4B62-88CE-2D23F457573B", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*", "matchCriteriaId": "F90A3E1F-0371-45C0-A165-55D94A62C3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "F80A5D98-6C48-461F-8B96-BD32A96CDCA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*", "matchCriteriaId": "92F4E55E-4424-4EC8-8013-9A0FFE7D3658", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*", "matchCriteriaId": "9DA61C83-9CE0-4B5E-A8A1-B9C5C9D74084", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "8B13CCAA-839F-406D-A7F3-975B4780425A", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*", "matchCriteriaId": "1D375197-0087-479C-991B-964FB83644F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*", "matchCriteriaId": "70F6320E-314D-4A8F-BC9A-29F730035C68", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8EE03D77-9AA8-4DC6-936D-0459BD26B64B", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:7.0_final:*:*:*:*:*:*:*", "matchCriteriaId": "F3E16D17-B704-4ADA-8F91-B7D96FB52909", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA80B501-6EC3-4C8E-A83D-F08FC659CF82", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "87591D05-AC0B-4047-AE5B-69EBEF63ED5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "CBB90508-B7AE-4018-B88C-7A09F1EEFAB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oscommerce:osc2nuke:7x_1.0:*:*:*:*:*:*:*", "matchCriteriaId": "334BB9BD-EB60-4B69-88A7-01B9EC6B509D", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_laudanski:betanc_php-nuke:bundle:*:*:*:*:*:*:*", "matchCriteriaId": "69CDDF6D-7D41-49DC-BCC5-CDEDC68465CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER[\u0027PHP_SELF\u0027] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the \"admin.php\" string." } ], "id": "CVE-2004-2044", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-06-01T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html" }, { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108611606320559\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108611643614881\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108662955105757\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/11766" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.osvdb.org/6593" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10447" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16294" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16296" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16297" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108611606320559\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108611643614881\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108662955105757\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/11766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.osvdb.org/6593" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10447" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16294" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16298" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-200406-0051
Vulnerability from variot
PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the "admin.php" string. PHP-Nuke is affected by a direct script access security vulnerability. This issue is due to a failure to properly validate the location and name of the file being accessed. This issue will allow an attacker to gain access to sensitive scripts such as the 'admin.php' script. The attacker may be able to exploit this unauthorized access to carry out attacks against the affected application. PHP-Nuke is a popular website creation and management tool, it can use many database software as backend, such as MySQL, PostgreSQL, mSQL, Interbase, Sybase, etc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200406-0051", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.2" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "6.0" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.0" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.6" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.4" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "6.5" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.3.1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.2a" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.5" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.5_final" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "5.0.1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.0" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.5_beta1" }, { "model": "secure linux", "scope": "eq", "trust": 1.0, "vendor": "trustix", "version": "2.1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.2" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.7" }, { "model": "secure linux", "scope": "eq", "trust": 1.0, "vendor": "trustix", "version": "2.0" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.5_rc2" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.3" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.5_rc1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.9" }, { "model": "osc2nuke", "scope": "eq", "trust": 1.0, "vendor": "oscommerce", "version": "7x_1.0" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.0_final" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.5_rc3" }, { "model": "betanc php-nuke", "scope": "eq", "trust": 1.0, "vendor": "paul laudanski", "version": "bundle" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.6" }, { "model": "laudanski betanc php-nuke bundle", "scope": null, "trust": 0.3, "vendor": "paul", "version": null }, { "model": "osc2nuke", "scope": "eq", "trust": 0.3, "vendor": "oscommerce", "version": "7x1.0" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.3" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.2" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.1" }, { "model": "burzi php-nuke final", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.0" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.0" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.9" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.7" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.6" }, { "model": "burzi php-nuke rc3", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke rc2", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke rc1", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke final", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke beta", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.51" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.0" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.6" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.5" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.4" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.3.1" }, { "model": "burzi php-nuke a", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.2" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.2" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.1" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.0.1" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.0" } ], "sources": [ { "db": "BID", "id": "10447" }, { "db": "CNNVD", "id": "CNNVD-200406-037" }, { "db": "NVD", "id": "CVE-2004-2044" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Squid squidsecurity@hushmail.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200406-037" } ], "trust": 0.6 }, "cve": "CVE-2004-2044", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2004-2044", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-10472", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2004-2044", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200406-037", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-10472", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-10472" }, { "db": "CNNVD", "id": "CNNVD-200406-037" }, { "db": "NVD", "id": "CVE-2004-2044" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER[\u0027PHP_SELF\u0027] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the \"admin.php\" string. PHP-Nuke is affected by a direct script access security vulnerability. This issue is due to a failure to properly validate the location and name of the file being accessed. \nThis issue will allow an attacker to gain access to sensitive scripts such as the \u0027admin.php\u0027 script. The attacker may be able to exploit this unauthorized access to carry out attacks against the affected application. PHP-Nuke is a popular website creation and management tool, it can use many database software as backend, such as MySQL, PostgreSQL, mSQL, Interbase, Sybase, etc", "sources": [ { "db": "NVD", "id": "CVE-2004-2044" }, { "db": "BID", "id": "10447" }, { "db": "VULHUB", "id": "VHN-10472" } ], "trust": 1.26 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-10472", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-10472" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "10447", "trust": 2.0 }, { "db": "NVD", "id": "CVE-2004-2044", "trust": 1.7 }, { "db": "OSVDB", "id": "6593", "trust": 1.7 }, { "db": "SECUNIA", "id": "11766", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-200406-037", "trust": 0.7 }, { "db": "XF", "id": "2", "trust": 0.6 }, { "db": "XF", "id": "16294", "trust": 0.6 }, { "db": "XF", "id": "16298", "trust": 0.6 }, { "db": "XF", "id": "16297", "trust": 0.6 }, { "db": "XF", "id": "16296", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20040601 [SQUID 2004-OSC2NUKE-001] INADEQUATE SECURITY CHECKING IN OSC2NUKE", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20040601 [SQUID 2004-BETANC-001] INADEQUATE SECURITY CHECKING IN NUKECOPS BETANC BUNDLE", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20040601 [SQUID 2004-BETANC-001] INADEQUATE SECURITY CHECKING IN NUKECOPS", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20040601 [SQUID 2004-NUKE-001] INADEQUATE SECURITY CHECKING IN PHPNUKE", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20040606 RE: [SQUID 2004-NUKE-001] INADEQUATE SECURITY CHECKING IN PHPNUKE", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-77899", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "24166", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-10472", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-10472" }, { "db": "BID", "id": "10447" }, { "db": "CNNVD", "id": "CNNVD-200406-037" }, { "db": "NVD", "id": "CVE-2004-2044" } ] }, "id": "VAR-200406-0051", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-10472" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:14:26.933000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-2044" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/10447" }, { "trust": 1.7, "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html" }, { "trust": 1.7, "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html" }, { "trust": 1.7, "url": "http://www.osvdb.org/6593" }, { "trust": 1.7, "url": "http://secunia.com/advisories/11766" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16298" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16296" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16297" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16294" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=108611606320559\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=108611643614881\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=108662955105757\u0026w=2" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/16298" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/16297" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/16296" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/16294" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=108662955105757\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=108611643614881\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=108611606320559\u0026w=2" }, { "trust": 0.3, "url": "http://www.oscommerce.com" }, { "trust": 0.3, "url": "http://www.irannuke.com/" }, { "trust": 0.3, "url": "/archive/1/364840" }, { "trust": 0.3, "url": "/archive/1/364842" }, { "trust": 0.3, "url": "/archive/1/364847" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=108611643614881\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=108611606320559\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=108662955105757\u0026amp;w=2" } ], "sources": [ { "db": "VULHUB", "id": "VHN-10472" }, { "db": "BID", "id": "10447" }, { "db": "CNNVD", "id": "CNNVD-200406-037" }, { "db": "NVD", "id": "CVE-2004-2044" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-10472" }, { "db": "BID", "id": "10447" }, { "db": "CNNVD", "id": "CNNVD-200406-037" }, { "db": "NVD", "id": "CVE-2004-2044" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-06-01T00:00:00", "db": "VULHUB", "id": "VHN-10472" }, { "date": "2004-06-01T00:00:00", "db": "BID", "id": "10447" }, { "date": "2004-06-01T00:00:00", "db": "CNNVD", "id": "CNNVD-200406-037" }, { "date": "2004-06-01T04:00:00", "db": "NVD", "id": "CVE-2004-2044" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-10472" }, { "date": "2004-06-01T00:00:00", "db": "BID", "id": "10447" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200406-037" }, { "date": "2024-11-20T23:52:21.970000", "db": "NVD", "id": "CVE-2004-2044" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200406-037" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PHP-Nuke Direct Script Access Security Bypass Vulnerability", "sources": [ { "db": "BID", "id": "10447" }, { "db": "CNNVD", "id": "CNNVD-200406-037" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access verification error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200406-037" } ], "trust": 0.6 } }
CVE-2004-2044 (GCVE-0-2004-2044)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16298 | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16294 | vdb-entry, x_refsource_XF | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16297 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/6593 | vdb-entry, x_refsource_OSVDB | |
http://marc.info/?l=bugtraq&m=108662955105757&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/10447 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=108611606320559&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16296 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/11766 | third-party-advisory, x_refsource_SECUNIA | |
http://marc.info/?l=bugtraq&m=108611643614881&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:15:01.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040601 [Squid 2004-betaNC-001] Inadequate Security Checking in NukeCops betaNC Bundle", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html" }, { "name": "nukecops-ergei-path-disclosure(16298)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16298" }, { "name": "20040601 [Squid 2004-OSC2Nuke-001] Inadequate Security Checking in OSC2Nuke", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html" }, { "name": "phpnuke-eregi-path-disclosure(16294)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16294" }, { "name": "oscnukelite-eregi-path-disclosure(16297)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16297" }, { "name": "6593", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/6593" }, { "name": "20040606 Re: [Squid 2004-Nuke-001] Inadequate Security Checking in PHPNuke", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108662955105757\u0026w=2" }, { "name": "10447", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10447" }, { "name": "20040601 [Squid 2004-betaNC-001] Inadequate Security Checking in NukeCops", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108611606320559\u0026w=2" }, { "name": "osc2nuke-eregi-path-disclosure(16296)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16296" }, { "name": "11766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11766" }, { "name": "20040601 [Squid 2004-Nuke-001] Inadequate Security Checking in PHPNuke", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108611643614881\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER[\u0027PHP_SELF\u0027] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the \"admin.php\" string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040601 [Squid 2004-betaNC-001] Inadequate Security Checking in NukeCops betaNC Bundle", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html" }, { "name": "nukecops-ergei-path-disclosure(16298)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16298" }, { "name": "20040601 [Squid 2004-OSC2Nuke-001] Inadequate Security Checking in OSC2Nuke", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html" }, { "name": "phpnuke-eregi-path-disclosure(16294)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16294" }, { "name": "oscnukelite-eregi-path-disclosure(16297)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16297" }, { "name": "6593", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/6593" }, { "name": "20040606 Re: [Squid 2004-Nuke-001] Inadequate Security Checking in PHPNuke", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108662955105757\u0026w=2" }, { "name": "10447", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10447" }, { "name": "20040601 [Squid 2004-betaNC-001] Inadequate Security Checking in NukeCops", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108611606320559\u0026w=2" }, { "name": "osc2nuke-eregi-path-disclosure(16296)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16296" }, { "name": "11766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11766" }, { "name": "20040601 [Squid 2004-Nuke-001] Inadequate Security Checking in PHPNuke", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108611643614881\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2044", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER[\u0027PHP_SELF\u0027] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the \"admin.php\" string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040601 [Squid 2004-betaNC-001] Inadequate Security Checking in NukeCops betaNC Bundle", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html" }, { "name": "nukecops-ergei-path-disclosure(16298)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16298" }, { "name": "20040601 [Squid 2004-OSC2Nuke-001] Inadequate Security Checking in OSC2Nuke", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html" }, { "name": "phpnuke-eregi-path-disclosure(16294)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16294" }, { "name": "oscnukelite-eregi-path-disclosure(16297)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16297" }, { "name": "6593", "refsource": "OSVDB", "url": "http://www.osvdb.org/6593" }, { "name": "20040606 Re: [Squid 2004-Nuke-001] Inadequate Security Checking in PHPNuke", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108662955105757\u0026w=2" }, { "name": "10447", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10447" }, { "name": "20040601 [Squid 2004-betaNC-001] Inadequate Security Checking in NukeCops", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108611606320559\u0026w=2" }, { "name": "osc2nuke-eregi-path-disclosure(16296)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16296" }, { "name": "11766", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11766" }, { "name": "20040601 [Squid 2004-Nuke-001] Inadequate Security Checking in PHPNuke", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108611643614881\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2044", "datePublished": "2005-05-10T04:00:00", "dateReserved": "2005-05-04T00:00:00", "dateUpdated": "2024-08-08T01:15:01.619Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }