var-200411-0029
Vulnerability from variot

SQL injection vulnerability in PHP-Nuke 6.9 and earlier, and possibly 7.x, allows remote attackers to inject arbitrary SQL code and gain sensitive information via (1) the category variable in the Search module or (2) the admin variable in the Web_Links module. francisco burzi of php-nuke Exists in unspecified vulnerabilities.None. It has been reported that PHPNuke may prone to a SQL injection vulnerability, due to insufficient sanitization user-supplied input. The problem is reported to exist in the $category variable contained within the 'index.php' page. PHPNuke versions 6.9 and prior have been reported to be prone to this issue, however other versions may be affected as well. PHP-Nuke is a popular website creation and management tool, it can use many database software as backend, such as MySQL, PostgreSQL, mSQL, Interbase, Sybase, etc. The \'\'index.php\'\' script included in PHP-Nuke lacks adequate filtering of the parameters submitted by users. When performing a search, the index.php script does not fully filter the data submitted by the user to the $category variable. Submitting data containing SQL commands as the $category variable parameter can change the original database logic, obtain database sensitive information and modify database content

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200411-0029",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "francisco burzi",
        "version": "4.4.1a"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "francisco burzi",
        "version": "2.5"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "francisco burzi",
        "version": "5.0"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "francisco burzi",
        "version": "4.4"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "francisco burzi",
        "version": "6.0"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "francisco burzi",
        "version": "3.0"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "francisco burzi",
        "version": "1.0"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "francisco burzi",
        "version": "4.0"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "francisco burzi",
        "version": "5.5"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "francisco burzi",
        "version": "5.2"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "francisco burzi",
        "version": "5.0.1"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "francisco burzi",
        "version": "5.4"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "francisco burzi",
        "version": "6.5"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "francisco burzi",
        "version": "5.2a"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "francisco burzi",
        "version": "5.1"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "francisco burzi",
        "version": "5.6"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "francisco burzi",
        "version": "4.3"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "francisco burzi",
        "version": "5.3.1"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "francisco burzi",
        "version": "6.7"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "francisco burzi",
        "version": "6.6"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "francisco burzi",
        "version": "6.5_final"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "francisco burzi",
        "version": "6.5_beta1"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "francisco burzi",
        "version": "6.5_rc3"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "francisco burzi",
        "version": "6.5_rc2"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "francisco burzi",
        "version": "6.5_rc1"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "francisco burzi",
        "version": "6.9"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "francisco burzi",
        "version": null
      },
      {
        "model": "php-nuke",
        "scope": null,
        "trust": 0.8,
        "vendor": "francisco burzi",
        "version": null
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "francisco burzi",
        "version": "6.5 beta1"
      },
      {
        "model": "php-nuke",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "francisco burzi",
        "version": "6.5 final"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "6.9"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "6.7"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "6.6"
      },
      {
        "model": "burzi php-nuke rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "6.5"
      },
      {
        "model": "burzi php-nuke rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "6.5"
      },
      {
        "model": "burzi php-nuke rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "6.5"
      },
      {
        "model": "burzi php-nuke final",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "6.5"
      },
      {
        "model": "burzi php-nuke beta",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "6.51"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "6.5"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "6.0"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "5.6"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "5.5"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "5.4"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "5.3.1"
      },
      {
        "model": "burzi php-nuke a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "5.2"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "5.2"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "5.1"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "5.0.1"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "5.0"
      },
      {
        "model": "burzi php-nuke a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "4.4.1"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "4.4"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "4.3"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "4.0"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "3.0"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "2.5"
      },
      {
        "model": "burzi php-nuke",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "francisco",
        "version": "1.0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "9630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000750"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0269"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "pokleyzz\u203b pokleyzz@scan-associates.net",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-123"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2004-0269",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2004-0269",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-8699",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2004-0269",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2004-0269",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200411-123",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-8699",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-8699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000750"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0269"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SQL injection vulnerability in PHP-Nuke 6.9 and earlier, and possibly 7.x, allows remote attackers to inject arbitrary SQL code and gain sensitive information via (1) the category variable in the Search module or (2) the admin variable in the Web_Links module. francisco burzi of php-nuke Exists in unspecified vulnerabilities.None. It has been reported that PHPNuke may prone to a SQL injection vulnerability, due to insufficient sanitization user-supplied input.  The problem is reported to exist in the $category variable contained within the \u0027index.php\u0027 page. \nPHPNuke versions 6.9 and prior have been reported to be prone to this issue, however other versions may be affected as well. PHP-Nuke is a popular website creation and management tool, it can use many database software as backend, such as MySQL, PostgreSQL, mSQL, Interbase, Sybase, etc. The \\\u0027\\\u0027index.php\\\u0027\\\u0027 script included in PHP-Nuke lacks adequate filtering of the parameters submitted by users. When performing a search, the index.php script does not fully filter the data submitted by the user to the $category variable. Submitting data containing SQL commands as the $category variable parameter can change the original database logic, obtain database sensitive information and modify database content",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0269"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000750"
      },
      {
        "db": "BID",
        "id": "9630"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8699"
      }
    ],
    "trust": 1.98
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-8699",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-8699"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2004-0269",
        "trust": 3.6
      },
      {
        "db": "BID",
        "id": "9630",
        "trust": 2.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000750",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-123",
        "trust": 0.7
      },
      {
        "db": "BUGTRAQ",
        "id": "20040210 [SCAN ASSOCIATES SDN BHD SECURITY ADVISORY] PHPNUKE 6.9 \u003e AND BELOW SQL INJECTION IN MULTIPLE MODULE",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "15115",
        "trust": 0.6
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-76388",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-77430",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "22589",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "23680",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-8699",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-8699"
      },
      {
        "db": "BID",
        "id": "9630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000750"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0269"
      }
    ]
  },
  "id": "VAR-200411-0029",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-8699"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T14:48:10.984000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "others (CWE-Other) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000750"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0269"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/9630"
      },
      {
        "trust": 1.9,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15115"
      },
      {
        "trust": 1.8,
        "url": "http://marc.info/?l=bugtraq\u0026m=107643348117646\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://www.scan-associates.net/papers/phpnuke69.txt"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0269"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=107643348117646\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/15115"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/353291"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=107643348117646\u0026amp;w=2"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-8699"
      },
      {
        "db": "BID",
        "id": "9630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000750"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0269"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-8699"
      },
      {
        "db": "BID",
        "id": "9630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000750"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0269"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-11-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-8699"
      },
      {
        "date": "2004-02-10T00:00:00",
        "db": "BID",
        "id": "9630"
      },
      {
        "date": "2024-05-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2004-000750"
      },
      {
        "date": "2004-02-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200411-123"
      },
      {
        "date": "2004-11-23T05:00:00",
        "db": "NVD",
        "id": "CVE-2004-0269"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-8699"
      },
      {
        "date": "2009-07-12T02:06:00",
        "db": "BID",
        "id": "9630"
      },
      {
        "date": "2024-05-27T03:27:00",
        "db": "JVNDB",
        "id": "JVNDB-2004-000750"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200411-123"
      },
      {
        "date": "2017-07-11T01:30:01.510000",
        "db": "NVD",
        "id": "CVE-2004-0269"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-123"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "francisco\u00a0burzi\u00a0 of \u00a0php-nuke\u00a0 Vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000750"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-123"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…