Vulnerabilites related to warpspeed - 4nguestbook
cve-2004-2354
Vulnerability from cvelistv5
Published
2005-08-16 04:00
Modified
2024-08-08 01:22
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in 4nGuestbook 0.92 for PHP-Nuke 6.5 through 6.9 allows remote attackers to modify SQL statements via the entry parameter to modules.php, which can also facilitate cross-site scripting (XSS) attacks when MySQL errors are triggered.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/15478 | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/bugtraq/2004-03/0139.html | mailing-list, x_refsource_BUGTRAQ |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T01:22:13.652Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "4nguestbook-modules-xss(15478)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15478", }, { name: "20040315 [waraxe-2004-SA#007 - XSS and SQL injection bugs in 4nguestbook module for PhpNuke]", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://archives.neohapsis.com/archives/bugtraq/2004-03/0139.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-03-15T00:00:00", descriptions: [ { lang: "en", value: "SQL injection vulnerability in 4nGuestbook 0.92 for PHP-Nuke 6.5 through 6.9 allows remote attackers to modify SQL statements via the entry parameter to modules.php, which can also facilitate cross-site scripting (XSS) attacks when MySQL errors are triggered.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "4nguestbook-modules-xss(15478)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15478", }, { name: "20040315 [waraxe-2004-SA#007 - XSS and SQL injection bugs in 4nguestbook module for PhpNuke]", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://archives.neohapsis.com/archives/bugtraq/2004-03/0139.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-2354", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "SQL injection vulnerability in 4nGuestbook 0.92 for PHP-Nuke 6.5 through 6.9 allows remote attackers to modify SQL statements via the entry parameter to modules.php, which can also facilitate cross-site scripting (XSS) attacks when MySQL errors are triggered.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "4nguestbook-modules-xss(15478)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15478", }, { name: "20040315 [waraxe-2004-SA#007 - XSS and SQL injection bugs in 4nguestbook module for PhpNuke]", refsource: "BUGTRAQ", url: "http://archives.neohapsis.com/archives/bugtraq/2004-03/0139.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-2354", datePublished: "2005-08-16T04:00:00", dateReserved: "2005-08-16T00:00:00", dateUpdated: "2024-08-08T01:22:13.652Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
var-200412-0461
Vulnerability from variot
SQL injection vulnerability in 4nGuestbook 0.92 for PHP-Nuke 6.5 through 6.9 allows remote attackers to modify SQL statements via the entry parameter to modules.php, which can also facilitate cross-site scripting (XSS) attacks when MySQL errors are triggered. 4Nguestbook is prone to a cross-site scripting vulnerability. A SQL injection vulnerability exists in 4nGuestbook 0.92 of PHP-Nuke 6.5 and 6.9 versions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-200412-0461", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "php-nuke", scope: "eq", trust: 1.6, vendor: "francisco burzi", version: "6.7", }, { model: "php-nuke", scope: "eq", trust: 1.6, vendor: "francisco burzi", version: "6.6", }, { model: "php-nuke", scope: "eq", trust: 1.6, vendor: "francisco burzi", version: "6.5_beta1", }, { model: "php-nuke", scope: "eq", trust: 1.6, vendor: "francisco burzi", version: "6.5_rc3", }, { model: "php-nuke", scope: "eq", trust: 1.6, vendor: "francisco burzi", version: "6.5_rc2", }, { model: "php-nuke", scope: "eq", trust: 1.6, vendor: "francisco burzi", version: "6.5_final", }, { model: "php-nuke", scope: "eq", trust: 1.6, vendor: "francisco burzi", version: "6.5_rc1", }, { model: "php-nuke", scope: "eq", trust: 1.6, vendor: "francisco burzi", version: "6.5", }, { model: "php-nuke", scope: "eq", trust: 1.6, vendor: "francisco burzi", version: "6.9", }, { model: "4nguestbook", scope: "eq", trust: 1.3, vendor: "warpspeed", version: "0.92", }, { model: "burzi php-nuke", scope: "eq", trust: 0.3, vendor: "francisco", version: "6.9", }, { model: "burzi php-nuke", scope: "eq", trust: 0.3, vendor: "francisco", version: "6.7", }, { model: "burzi php-nuke", scope: "eq", trust: 0.3, vendor: "francisco", version: "6.6", }, { model: "burzi php-nuke rc3", scope: "eq", trust: 0.3, vendor: "francisco", version: "6.5", }, { model: "burzi php-nuke rc2", scope: "eq", trust: 0.3, vendor: "francisco", version: "6.5", }, { model: "burzi php-nuke rc1", scope: "eq", trust: 0.3, vendor: "francisco", version: "6.5", }, { model: "burzi php-nuke final", scope: "eq", trust: 0.3, vendor: "francisco", version: "6.5", }, { model: "burzi php-nuke beta1", scope: "eq", trust: 0.3, vendor: "francisco", version: "6.5", }, { model: "burzi php-nuke", scope: "eq", trust: 0.3, vendor: "francisco", version: "6.5", }, ], sources: [ { db: "BID", id: "82581", }, { db: "NVD", id: "CVE-2004-2354", }, { db: "CNNVD", id: "CNNVD-200412-1038", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:warpspeed:4nguestbook:0.92:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2004-2354", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Unknown", sources: [ { db: "BID", id: "82581", }, ], trust: 0.3, }, cve: "CVE-2004-2354", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, impactScore: 6.4, integrityImpact: "PARTIAL", obtainAllPrivilege: false, obtainOtherPrivilege: true, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, id: "VHN-10782", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:M/AU:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [], severity: [ { author: "NVD", id: "CVE-2004-2354", trust: 1, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-200412-1038", trust: 0.6, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-10782", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-10782", }, { db: "NVD", id: "CVE-2004-2354", }, { db: "CNNVD", id: "CNNVD-200412-1038", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "SQL injection vulnerability in 4nGuestbook 0.92 for PHP-Nuke 6.5 through 6.9 allows remote attackers to modify SQL statements via the entry parameter to modules.php, which can also facilitate cross-site scripting (XSS) attacks when MySQL errors are triggered. 4Nguestbook is prone to a cross-site scripting vulnerability. A SQL injection vulnerability exists in 4nGuestbook 0.92 of PHP-Nuke 6.5 and 6.9 versions", sources: [ { db: "NVD", id: "CVE-2004-2354", }, { db: "BID", id: "82581", }, { db: "VULHUB", id: "VHN-10782", }, ], trust: 1.26, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2004-2354", trust: 2, }, { db: "XF", id: "15478", trust: 0.9, }, { db: "XF", id: "4", trust: 0.6, }, { db: "BUGTRAQ", id: "20040315 [WARAXE-2004-SA#007 - XSS AND SQL INJECTION BUGS IN 4NGUESTBOOK MODULE FOR PHPNUKE]", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-200412-1038", trust: 0.6, }, { db: "BID", id: "82581", trust: 0.4, }, { db: "VULHUB", id: "VHN-10782", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-10782", }, { db: "BID", id: "82581", }, { db: "NVD", id: "CVE-2004-2354", }, { db: "CNNVD", id: "CNNVD-200412-1038", }, ], }, id: "VAR-200412-0461", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-10782", }, ], trust: 0.01, }, last_update_date: "2023-12-18T10:58:50.464000Z", problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-Other", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2004-2354", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2, url: "http://archives.neohapsis.com/archives/bugtraq/2004-03/0139.html", }, { trust: 1.1, url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15478", }, { trust: 0.9, url: "http://xforce.iss.net/xforce/xfdb/15478", }, ], sources: [ { db: "VULHUB", id: "VHN-10782", }, { db: "BID", id: "82581", }, { db: "NVD", id: "CVE-2004-2354", }, { db: "CNNVD", id: "CNNVD-200412-1038", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-10782", }, { db: "BID", id: "82581", }, { db: "NVD", id: "CVE-2004-2354", }, { db: "CNNVD", id: "CNNVD-200412-1038", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2004-12-31T00:00:00", db: "VULHUB", id: "VHN-10782", }, { date: "2004-12-31T00:00:00", db: "BID", id: "82581", }, { date: "2004-12-31T05:00:00", db: "NVD", id: "CVE-2004-2354", }, { date: "2004-12-31T00:00:00", db: "CNNVD", id: "CNNVD-200412-1038", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-07-11T00:00:00", db: "VULHUB", id: "VHN-10782", }, { date: "2004-12-31T00:00:00", db: "BID", id: "82581", }, { date: "2017-07-11T01:31:49.390000", db: "NVD", id: "CVE-2004-2354", }, { date: "2005-10-20T00:00:00", db: "CNNVD", id: "CNNVD-200412-1038", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-200412-1038", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "PHP-Nuke 4nGuestbookSQL Injection vulnerability", sources: [ { db: "CNNVD", id: "CNNVD-200412-1038", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "XSS", sources: [ { db: "CNNVD", id: "CNNVD-200412-1038", }, ], trust: 0.6, }, }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
SQL injection vulnerability in 4nGuestbook 0.92 for PHP-Nuke 6.5 through 6.9 allows remote attackers to modify SQL statements via the entry parameter to modules.php, which can also facilitate cross-site scripting (XSS) attacks when MySQL errors are triggered.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
francisco_burzi | php-nuke | 6.5 | |
francisco_burzi | php-nuke | 6.5_beta1 | |
francisco_burzi | php-nuke | 6.5_final | |
francisco_burzi | php-nuke | 6.5_rc1 | |
francisco_burzi | php-nuke | 6.5_rc2 | |
francisco_burzi | php-nuke | 6.5_rc3 | |
francisco_burzi | php-nuke | 6.6 | |
francisco_burzi | php-nuke | 6.7 | |
francisco_burzi | php-nuke | 6.9 | |
warpspeed | 4nguestbook | 0.92 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*", matchCriteriaId: "23264211-2992-4222-9B96-5ABEE1332C5B", vulnerable: true, }, { criteria: "cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*", matchCriteriaId: "B7F76C32-E24D-4B62-88CE-2D23F457573B", vulnerable: true, }, { criteria: "cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*", matchCriteriaId: "F90A3E1F-0371-45C0-A165-55D94A62C3DA", vulnerable: true, }, { criteria: "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*", matchCriteriaId: "F80A5D98-6C48-461F-8B96-BD32A96CDCA1", vulnerable: true, }, { criteria: "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*", matchCriteriaId: "92F4E55E-4424-4EC8-8013-9A0FFE7D3658", vulnerable: true, }, { criteria: "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*", matchCriteriaId: "9DA61C83-9CE0-4B5E-A8A1-B9C5C9D74084", vulnerable: true, }, { criteria: "cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*", matchCriteriaId: "8B13CCAA-839F-406D-A7F3-975B4780425A", vulnerable: true, }, { criteria: "cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*", matchCriteriaId: "1D375197-0087-479C-991B-964FB83644F4", vulnerable: true, }, { criteria: "cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*", matchCriteriaId: "70F6320E-314D-4A8F-BC9A-29F730035C68", vulnerable: true, }, { criteria: "cpe:2.3:a:warpspeed:4nguestbook:0.92:*:*:*:*:*:*:*", matchCriteriaId: "F843038F-A98A-4FE7-9F31-AC614C776335", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "SQL injection vulnerability in 4nGuestbook 0.92 for PHP-Nuke 6.5 through 6.9 allows remote attackers to modify SQL statements via the entry parameter to modules.php, which can also facilitate cross-site scripting (XSS) attacks when MySQL errors are triggered.", }, ], id: "CVE-2004-2354", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: true, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2004-12-31T05:00:00.000", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Vendor Advisory", ], url: "http://archives.neohapsis.com/archives/bugtraq/2004-03/0139.html", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15478", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Vendor Advisory", ], url: "http://archives.neohapsis.com/archives/bugtraq/2004-03/0139.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15478", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }