Search criteria
27 vulnerabilities found for sawmill by sawmill
FKIE_CVE-2017-5496
Vulnerability from fkie_nvd - Published: 2017-03-15 15:59 - Updated: 2025-04-20 01:37
Severity ?
Summary
Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.7.9:*:*:*:*:enterprise:*:*",
"matchCriteriaId": "F134D70D-D84A-4BB9-A1CB-E4FF2509AE1F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash."
},
{
"lang": "es",
"value": "Sawmill Enterprise 8.7.9 permite a atacantes remotos obtener acceso al inicio de sesi\u00f3n aprovechando el conocimiento de un hash de contrase\u00f1a."
}
],
"id": "CVE-2017-5496",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-03-15T15:59:00.640",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2017/Feb/46"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/41395/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2017/Feb/46"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/41395/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-4947
Vulnerability from fkie_nvd - Published: 2013-07-29 23:27 - Updated: 2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sawmill:sawmill:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E62E62A-D0A5-4CDF-805F-8B6D70F6D481",
"versionEndIncluding": "8.6.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "60558951-0526-4E73-BAFC-C649EC962C22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "18833838-1EE9-4E04-B849-735EAF9DDAFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "507A39DC-6C76-4F46-9448-925358DB9906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "7A988A88-7B0E-4D8E-B92D-E4BFE78E0C51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "DE7D1432-5421-4219-9332-6FF181ADF73D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "8737C0FB-04F1-41FF-92F8-D4EC65EE78D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "E5DB8D8A-6519-49BF-B7BA-B4A96FDDDD54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b7:*:*:*:*:*:*",
"matchCriteriaId": "06238BAD-1AA8-44A7-A6CE-66E56BFBBFA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b8:*:*:*:*:*:*",
"matchCriteriaId": "23A95EC4-41AB-4ACC-9A46-CCE9C12ADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "788DEA64-756D-42C2-B372-5C245D5FEC7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4BCD1671-64B1-430A-ABC3-EC9FA9126DDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "01A6E211-EB2F-426C-A18D-89EB98AF77A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "84932781-1B2E-4E75-BC7F-73088D981413",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "838C2320-00E2-4530-8DE6-115D29402B00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C59A713A-41D3-4C3D-BC1A-4FAE09E2D61D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "356C46DC-4D33-4AC5-BB20-0D9BEF4A168C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5ED32E07-219A-402D-9B02-72A51CC543CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AD4C113D-DFCD-4D2F-93C5-C5C138C920D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "21DC614A-EC58-42AA-BA30-2695EE2B3463",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A344DAE7-5D69-40E7-8D46-82E57FF0823B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC5E95C-EA0F-4914-A8FF-E9733B52C1E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DFD86C9B-701C-456F-8D9F-D014FBBC3DB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9ABE34D6-35C0-4F6E-AD35-C0AD8C58CE95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AA79B292-21F3-49B7-88CE-532166B38A24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "62EDA9B5-5870-4B71-94A9-988E157C4D2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "50A1139A-AAD0-488A-BC0E-59070D078545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "ED19F7DB-0AE2-4781-ABE7-4AB1C0E018EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D150D134-7D5D-4B27-8033-055D4FDC17B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A70CC121-204C-4119-AC2E-251DE2D4233D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.5:b3:*:*:*:*:*:*",
"matchCriteriaId": "50F187E1-F665-49FA-BA8E-70346775536B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.5:b4:*:*:*:*:*:*",
"matchCriteriaId": "15098288-454D-4BB1-9675-D62BDDD3A38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.5:b5:*:*:*:*:*:*",
"matchCriteriaId": "A8103A2E-C9D1-4859-9D74-E266CBE5BE03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8EF5819-8803-476A-9FA8-0B4B0B52764E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3972D4C8-4551-413C-94A1-DDEDC87E976A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "65739DAB-BD70-4C90-8381-012374E680F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7B03A3E7-4ED5-4C0B-9DFB-8DC4B78ED2DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5A7442A0-5FAD-4AD6-893F-2A079FE83B6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "111DBA57-B408-44DE-9980-E30C3DA9F799",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3F712D30-8B30-4C44-99C6-52C9B173350D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "70759888-22D2-423B-8320-1807AA150239",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2657E7F6-5A0B-4012-82C5-BF17CE31640A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "60603472-F885-4F3F-B8EC-9223DF27CF80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6FAA0BB-5103-42AF-9B75-FD5A00CAFFA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:8.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "76E89B85-4E1F-4CB3-8434-521C49F4E18B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en la base de datos update y build de Sawmill anterior a 8.6.3, permite a atacantes remotos provocar un impacto y vectores de ataque desconocidos."
}
],
"id": "CVE-2013-4947",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-07-29T23:27:49.883",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/95059"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54090"
},
{
"source": "cve@mitre.org",
"url": "http://www.sawmill.net/version_history8.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/61075"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/95059"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54090"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.sawmill.net/version_history8.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/61075"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2010-1079
Vulnerability from fkie_nvd - Published: 2010-03-23 19:30 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sawmill:sawmill:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25AF224F-F061-42A6-9A11-5691DE7A1E05",
"versionEndIncluding": "7.2.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:5.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "4673D2AA-E1BE-4809-94BE-7C6951E9D2D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5D715DBC-1C22-409E-8FA2-900B91CC75E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2B13F794-F9BD-401E-BD7A-12A17579A4A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "81813438-B42F-4847-97B4-18DD570C135E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9625F905-9935-45F4-838F-6D70F8F650A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0D316B5D-5D25-46C8-962E-D70141A1450F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B0BB9C09-307F-40FA-8EC2-E5E032558A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DB94450D-4EB4-4ACB-9D8C-0598F17207F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "634445B5-0C74-4EC1-B4B4-9CBDFC1BD8E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E039D3AD-F228-4079-A039-D9F11F7EF27E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "4CFE4AB2-2A37-4E49-9048-2E4BBF0DB4B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B0F358C2-1385-4D2C-A864-E72D73005DA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20D33B82-9DEA-40DC-802E-6E3033DB6A51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A2DB6C05-FE96-4789-A846-9BD997D0B925",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "B31CD272-8758-4307-8CA4-BC7F0CCB6167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "50BFC413-C0CF-4B15-899A-63D41FA93CB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "721B53C7-E1D8-4F7F-93C5-87E414FB3BEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F60FCBD-D8B1-4E69-B8C3-32659106B636",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "44518027-BCA4-45E5-8416-75FE36AD6D63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "21913F12-4790-487D-84F4-48EB09AB042A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8D6CC4EE-265E-47D2-B820-ACB4EF100953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3CDC8E37-ADF0-452D-A344-8A93ACB89D26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A78385D9-4652-48ED-A5E7-F50340D70F0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "27A6E5F4-73AF-4BDB-A2B4-2F24064F1D21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD29FBC-959E-4EBA-9C5A-7B6BCF53A2C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1C91865B-6527-466D-A88D-17E1CC8A1B89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "BAAFA876-B95A-40E5-9E42-8B37315BDE94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1E3D5C1E-80B7-413B-B49D-8DE6CC919770",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10a:*:*:*:*:*:*:*",
"matchCriteriaId": "06D5321E-DE25-4FC4-81EC-E6C9EC7BA836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10b:*:*:*:*:*:*:*",
"matchCriteriaId": "B790CF30-97C7-46A2-A300-E4D417870DEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10c:*:*:*:*:*:*:*",
"matchCriteriaId": "1A328FB8-ECC3-47D8-82B4-89372DD9A324",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10d:*:*:*:*:*:*:*",
"matchCriteriaId": "5FC7D8F1-454E-43A5-A886-3EA91E05F3DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "1916BD3D-51AF-4A25-8EAA-018C84B58B6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10f:*:*:*:*:*:*:*",
"matchCriteriaId": "5B1DB0AB-5BC6-4C26-8223-E6F11FDC8293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10g:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD07081-4460-4633-AE01-36BEE03193A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10h:*:*:*:*:*:*:*",
"matchCriteriaId": "CE8B60B1-DA99-46BC-AA84-0D5D620D6160",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10i:*:*:*:*:*:*:*",
"matchCriteriaId": "FB2979BD-01B9-4BF3-9C24-E529D11F435C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10j:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF43285-C448-436D-9089-C6D97802DCDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10k:*:*:*:*:*:*:*",
"matchCriteriaId": "65814DFE-6E73-4C78-BAAA-B7FBA9FBF526",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A088B4E4-9A13-4F39-9708-40529410AB03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F21B42F-56C2-422C-BFC8-701EDDCBE9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "B544D35C-3793-4656-92FC-F8BE72AC98F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "51A84B18-C5EA-4038-8123-1C9C2511BBCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "68176849-3128-4112-BCF0-577253552456",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FE9E422E-7EB8-407D-9DC4-4CCB83FAC834",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7887413C-0F1B-4EBC-8E97-8ECC9EB8336D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D9F909B4-62F6-4FD4-A0FB-F0BE918A2553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4F95EF53-7961-42A8-9BC5-0C53D6E81925",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1737B143-D96E-4B6F-9623-E5F41EB70074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF662B3-B127-4EB4-AD53-E528E626356C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "830F3AE5-B93F-48E4-B6EB-A5D2974274E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FCF0A754-420A-483E-BCD4-A46FC034D587",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "BF319AD0-BEEB-4348-A0BE-EAB4DB1D7F22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "C200EAB1-5F45-408D-BF1B-BEDAD2B1C06B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "FA5873ED-6E24-414A-92E9-01CE03C83284",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "33E6BA0A-2B7C-4AC6-B71E-613C70AE645F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0444940C-6F47-4F03-896C-FB5EB0A1DDEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FC22C387-CFFE-4AE5-8F46-0CBF15974C84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9AE436E1-E4A3-4BAC-87AE-F11702425251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BDAD10F0-E352-41CC-8413-A4D839127B5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6EF89CDA-312D-4399-8E46-1A6431C979C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4ABE7D3C-3FA2-47B5-A151-656C2FCCAAB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "35B2D63E-3C1D-4858-9BC7-C891944D1543",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0A5B19-A34A-47F1-ACA5-2D48F05FF278",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DA89A7B8-0A38-4669-8AAD-325C409044A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3D32128A-480F-40D5-9C18-87035390BEC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "59B0F738-5CEE-4542-9E26-04AF8D90E988",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "2C42BC9D-6D88-458D-AC03-031DD27E1733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "868D1999-47B8-4A13-AA15-DB3D3CF22C91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "AE3AA3CD-29CA-48F1-AAAC-BF68EB8EEA7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E8CF4632-3979-4AA6-A0AB-3CE378488F41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "7C94767C-7488-4662-9105-BA3D2C61DD52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Sawmill anteriores a la v7.2.18 permite a atacantes remotos inyectar secuencias de comandos web o HTML de forma arbitraria a trav\u00e9s de vectores inespec\u00edficos."
}
],
"id": "CVE-2010-1079",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2010-03-23T19:30:00.627",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/38730"
},
{
"source": "cve@mitre.org",
"url": "http://www.sawmill.net/version_history7.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/38387"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/38730"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.sawmill.net/version_history7.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/38387"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-2950
Vulnerability from fkie_nvd - Published: 2005-09-16 22:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| sawmill | sawmill | 7.0.0 | |
| sawmill | sawmill | 7.0.1 | |
| sawmill | sawmill | 7.0.2 | |
| sawmill | sawmill | 7.0.3 | |
| sawmill | sawmill | 7.0.4 | |
| sawmill | sawmill | 7.0.5 | |
| sawmill | sawmill | 7.0.6 | |
| sawmill | sawmill | 7.0.7 | |
| sawmill | sawmill | 7.0.8 | |
| sawmill | sawmill | 7.0.9 | |
| sawmill | sawmill | 7.0.10 | |
| sawmill | sawmill | 7.0.10a | |
| sawmill | sawmill | 7.0.10b | |
| sawmill | sawmill | 7.0.10c | |
| sawmill | sawmill | 7.0.10d | |
| sawmill | sawmill | 7.0.10e | |
| sawmill | sawmill | 7.0.10f | |
| sawmill | sawmill | 7.0.10g | |
| sawmill | sawmill | 7.0.10h | |
| sawmill | sawmill | 7.0.10i | |
| sawmill | sawmill | 7.0.10j | |
| sawmill | sawmill | 7.0.10k | |
| sawmill | sawmill | 7.1 | |
| sawmill | sawmill | 7.1.1 | |
| sawmill | sawmill | 7.1.2 | |
| sawmill | sawmill | 7.1.3 | |
| sawmill | sawmill | 7.1.4 | |
| sawmill | sawmill | 7.1.5 | |
| sawmill | sawmill | 7.1.6 | |
| sawmill | sawmill | 7.1.7 | |
| sawmill | sawmill | 7.1.8 | |
| sawmill | sawmill | 7.1.9 | |
| sawmill | sawmill | 7.1.10 | |
| sawmill | sawmill | 7.1.11 | |
| sawmill | sawmill | 7.1.12 | |
| sawmill | sawmill | 7.1.13 | |
| sawmill | sawmill | 7.1.14 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F60FCBD-D8B1-4E69-B8C3-32659106B636",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "44518027-BCA4-45E5-8416-75FE36AD6D63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "21913F12-4790-487D-84F4-48EB09AB042A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8D6CC4EE-265E-47D2-B820-ACB4EF100953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3CDC8E37-ADF0-452D-A344-8A93ACB89D26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A78385D9-4652-48ED-A5E7-F50340D70F0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "27A6E5F4-73AF-4BDB-A2B4-2F24064F1D21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD29FBC-959E-4EBA-9C5A-7B6BCF53A2C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1C91865B-6527-466D-A88D-17E1CC8A1B89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "BAAFA876-B95A-40E5-9E42-8B37315BDE94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1E3D5C1E-80B7-413B-B49D-8DE6CC919770",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10a:*:*:*:*:*:*:*",
"matchCriteriaId": "06D5321E-DE25-4FC4-81EC-E6C9EC7BA836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10b:*:*:*:*:*:*:*",
"matchCriteriaId": "B790CF30-97C7-46A2-A300-E4D417870DEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10c:*:*:*:*:*:*:*",
"matchCriteriaId": "1A328FB8-ECC3-47D8-82B4-89372DD9A324",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10d:*:*:*:*:*:*:*",
"matchCriteriaId": "5FC7D8F1-454E-43A5-A886-3EA91E05F3DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "1916BD3D-51AF-4A25-8EAA-018C84B58B6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10f:*:*:*:*:*:*:*",
"matchCriteriaId": "5B1DB0AB-5BC6-4C26-8223-E6F11FDC8293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10g:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD07081-4460-4633-AE01-36BEE03193A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10h:*:*:*:*:*:*:*",
"matchCriteriaId": "CE8B60B1-DA99-46BC-AA84-0D5D620D6160",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10i:*:*:*:*:*:*:*",
"matchCriteriaId": "FB2979BD-01B9-4BF3-9C24-E529D11F435C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10j:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF43285-C448-436D-9089-C6D97802DCDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10k:*:*:*:*:*:*:*",
"matchCriteriaId": "65814DFE-6E73-4C78-BAAA-B7FBA9FBF526",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A088B4E4-9A13-4F39-9708-40529410AB03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F21B42F-56C2-422C-BFC8-701EDDCBE9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "51A84B18-C5EA-4038-8123-1C9C2511BBCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "68176849-3128-4112-BCF0-577253552456",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FE9E422E-7EB8-407D-9DC4-4CCB83FAC834",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7887413C-0F1B-4EBC-8E97-8ECC9EB8336D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D9F909B4-62F6-4FD4-A0FB-F0BE918A2553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4F95EF53-7961-42A8-9BC5-0C53D6E81925",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1737B143-D96E-4B6F-9623-E5F41EB70074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF662B3-B127-4EB4-AD53-E528E626356C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "830F3AE5-B93F-48E4-B6EB-A5D2974274E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FCF0A754-420A-483E-BCD4-A46FC034D587",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "BF319AD0-BEEB-4348-A0BE-EAB4DB1D7F22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "C200EAB1-5F45-408D-BF1B-BEDAD2B1C06B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "FA5873ED-6E24-414A-92E9-01CE03C83284",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request."
}
],
"id": "CVE-2005-2950",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-09-16T22:03:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/16744/"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
},
{
"source": "cve@mitre.org",
"url": "http://www.sawmill.net/version_history.html"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/16744/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.sawmill.net/version_history.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-1901
Vulnerability from fkie_nvd - Published: 2005-06-09 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sawmill:sawmill:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A07AAC45-78A1-48B2-9C47-D8E6A8D6CE1D",
"versionEndIncluding": "7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F21B42F-56C2-422C-BFC8-701EDDCBE9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "B544D35C-3793-4656-92FC-F8BE72AC98F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "51A84B18-C5EA-4038-8123-1C9C2511BBCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "68176849-3128-4112-BCF0-577253552456",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FE9E422E-7EB8-407D-9DC4-4CCB83FAC834",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7887413C-0F1B-4EBC-8E97-8ECC9EB8336D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page."
}
],
"id": "CVE-2005-1901",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-06-09T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://secunia.com/advisories/15499"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1014106"
},
{
"source": "cve@mitre.org",
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/17102"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/17103"
},
{
"source": "cve@mitre.org",
"url": "http://www.sawmill.net/version_history7.html"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://secunia.com/advisories/15499"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1014106"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/17102"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/17103"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.sawmill.net/version_history7.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-1900
Vulnerability from fkie_nvd - Published: 2005-06-09 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sawmill:sawmill:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A07AAC45-78A1-48B2-9C47-D8E6A8D6CE1D",
"versionEndIncluding": "7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F21B42F-56C2-422C-BFC8-701EDDCBE9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "B544D35C-3793-4656-92FC-F8BE72AC98F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "51A84B18-C5EA-4038-8123-1C9C2511BBCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "68176849-3128-4112-BCF0-577253552456",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FE9E422E-7EB8-407D-9DC4-4CCB83FAC834",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:7.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7887413C-0F1B-4EBC-8E97-8ECC9EB8336D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license."
}
],
"id": "CVE-2005-1900",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-06-09T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://secunia.com/advisories/15499"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1014106"
},
{
"source": "cve@mitre.org",
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/17100"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/17101"
},
{
"source": "cve@mitre.org",
"url": "http://www.sawmill.net/version_history7.html"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://secunia.com/advisories/15499"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1014106"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/17100"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/17101"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.sawmill.net/version_history7.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2002-0265
Vulnerability from fkie_nvd - Published: 2002-05-29 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://marc.info/?l=bugtraq&m=101346206921270&w=2 | ||
| cve@mitre.org | http://www.iss.net/security_center/static/8173.php | Patch, Vendor Advisory | |
| cve@mitre.org | http://www.sawmill.net/version_history.html | Vendor Advisory | |
| cve@mitre.org | http://www.securityfocus.com/bid/4077 | Exploit, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=101346206921270&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/8173.php | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.sawmill.net/version_history.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/4077 | Exploit, Patch, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| sawmill | sawmill | 6.2 | |
| sawmill | sawmill | 6.2.1 | |
| sawmill | sawmill | 6.2.2 | |
| sawmill | sawmill | 6.2.3 | |
| sawmill | sawmill | 6.2.4 | |
| sawmill | sawmill | 6.2.5 | |
| sawmill | sawmill | 6.2.6 | |
| sawmill | sawmill | 6.2.7 | |
| sawmill | sawmill | 6.2.8 | |
| sawmill | sawmill | 6.2.8a | |
| sawmill | sawmill | 6.2.9 | |
| sawmill | sawmill | 6.2.10 | |
| sawmill | sawmill | 6.2.11 | |
| sawmill | sawmill | 6.2.12 | |
| sawmill | sawmill | 6.2.13 | |
| sawmill | sawmill | 6.2.14 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5D715DBC-1C22-409E-8FA2-900B91CC75E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2B13F794-F9BD-401E-BD7A-12A17579A4A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "81813438-B42F-4847-97B4-18DD570C135E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9625F905-9935-45F4-838F-6D70F8F650A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0D316B5D-5D25-46C8-962E-D70141A1450F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B0BB9C09-307F-40FA-8EC2-E5E032558A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DB94450D-4EB4-4ACB-9D8C-0598F17207F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "634445B5-0C74-4EC1-B4B4-9CBDFC1BD8E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E039D3AD-F228-4079-A039-D9F11F7EF27E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "4CFE4AB2-2A37-4E49-9048-2E4BBF0DB4B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B0F358C2-1385-4D2C-A864-E72D73005DA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20D33B82-9DEA-40DC-802E-6E3033DB6A51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A2DB6C05-FE96-4789-A846-9BD997D0B925",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "B31CD272-8758-4307-8CA4-BC7F0CCB6167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "50BFC413-C0CF-4B15-899A-63D41FA93CB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sawmill:sawmill:6.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "721B53C7-E1D8-4F7F-93C5-87E414FB3BEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file."
},
{
"lang": "es",
"value": "Sendmail para Solaris 6.2.14 y anteriores crea el fichero AdminPassword con permisos de escritura para todo el mundo. Esto permite que usuarios locales obtengan privilegios modificando este fichero."
}
],
"id": "CVE-2002-0265",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2002-05-29T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.iss.net/security_center/static/8173.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.sawmill.net/version_history.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/4077"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.iss.net/security_center/static/8173.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.sawmill.net/version_history.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/4077"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2000-0588
Vulnerability from fkie_nvd - Published: 2000-06-26 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sawmill:sawmill:5.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "4673D2AA-E1BE-4809-94BE-7C6951E9D2D4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands."
}
],
"id": "CVE-2000-0588",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2000-06-26T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
},
{
"source": "cve@mitre.org",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/1402"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/1402"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2000-0589
Vulnerability from fkie_nvd - Published: 2000-06-26 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sawmill:sawmill:5.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "4673D2AA-E1BE-4809-94BE-7C6951E9D2D4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration."
}
],
"id": "CVE-2000-0589",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2000-06-26T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
},
{
"source": "cve@mitre.org",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/1403"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/1403"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2017-5496 (GCVE-0-2017-5496)
Vulnerability from cvelistv5 – Published: 2017-03-15 15:00 – Updated: 2024-08-05 15:04
VLAI?
Summary
Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T15:04:14.702Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "41395",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/41395/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
},
{
"name": "20170221 Sawmill Enterprise v8.7.9 Pass The Hash Authentication Bypass",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2017/Feb/46"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-02-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-31T09:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "41395",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/41395/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
},
{
"name": "20170221 Sawmill Enterprise v8.7.9 Pass The Hash Authentication Bypass",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2017/Feb/46"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-5496",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "41395",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41395/"
},
{
"name": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
},
{
"name": "20170221 Sawmill Enterprise v8.7.9 Pass The Hash Authentication Bypass",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2017/Feb/46"
},
{
"name": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt",
"refsource": "MISC",
"url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-5496",
"datePublished": "2017-03-15T15:00:00",
"dateReserved": "2017-01-15T00:00:00",
"dateUpdated": "2024-08-05T15:04:14.702Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4947 (GCVE-0-2013-4947)
Vulnerability from cvelistv5 – Published: 2013-07-29 23:00 – Updated: 2024-08-06 16:59
VLAI?
Summary
Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:59:41.078Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "54090",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/54090"
},
{
"name": "95059",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/95059"
},
{
"name": "61075",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/61075"
},
{
"name": "sawmill-database-unspecified(85544)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sawmill.net/version_history8.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-07-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "54090",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/54090"
},
{
"name": "95059",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/95059"
},
{
"name": "61075",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/61075"
},
{
"name": "sawmill-database-unspecified(85544)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sawmill.net/version_history8.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-4947",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "54090",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54090"
},
{
"name": "95059",
"refsource": "OSVDB",
"url": "http://osvdb.org/95059"
},
{
"name": "61075",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61075"
},
{
"name": "sawmill-database-unspecified(85544)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
},
{
"name": "http://www.sawmill.net/version_history8.html",
"refsource": "CONFIRM",
"url": "http://www.sawmill.net/version_history8.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-4947",
"datePublished": "2013-07-29T23:00:00",
"dateReserved": "2013-07-29T00:00:00",
"dateUpdated": "2024-08-06T16:59:41.078Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-1079 (GCVE-0-2010-1079)
Vulnerability from cvelistv5 – Published: 2010-03-23 19:00 – Updated: 2024-09-16 17:33
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T01:14:05.359Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "38730",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38730"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "38387",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/38387"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-03-23T19:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "38730",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38730"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "38387",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/38387"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-1079",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "38730",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38730"
},
{
"name": "http://www.sawmill.net/version_history7.html",
"refsource": "CONFIRM",
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "38387",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38387"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-1079",
"datePublished": "2010-03-23T19:00:00Z",
"dateReserved": "2010-03-23T00:00:00Z",
"dateUpdated": "2024-09-16T17:33:26.616Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-2950 (GCVE-0-2005-2950)
Vulnerability from cvelistv5 – Published: 2005-09-16 04:00 – Updated: 2024-08-07 22:53
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:53:29.927Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sawmill.net/version_history.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
},
{
"name": "16744",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/16744/"
},
{
"name": "sawmill-unknown-xss(22206)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
},
{
"name": "20050912 Sawmill XSS vuln",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
},
{
"name": "1",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-09-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sawmill.net/version_history.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
},
{
"name": "16744",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/16744/"
},
{
"name": "sawmill-unknown-xss(22206)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
},
{
"name": "20050912 Sawmill XSS vuln",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
},
{
"name": "1",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-2950",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.sawmill.net/version_history.html",
"refsource": "CONFIRM",
"url": "http://www.sawmill.net/version_history.html"
},
{
"name": "http://www.nta-monitor.com/news/xss/sawmill/index.htm",
"refsource": "MISC",
"url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
},
{
"name": "16744",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16744/"
},
{
"name": "sawmill-unknown-xss(22206)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
},
{
"name": "20050912 Sawmill XSS vuln",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
},
{
"name": "1",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-2950",
"datePublished": "2005-09-16T04:00:00",
"dateReserved": "2005-09-16T00:00:00",
"dateUpdated": "2024-08-07T22:53:29.927Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-1900 (GCVE-0-2005-1900)
Vulnerability from cvelistv5 – Published: 2005-06-08 04:00 – Updated: 2024-08-07 22:06
VLAI?
Summary
Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:06:57.723Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "17100",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/17100"
},
{
"name": "1014106",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1014106"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"name": "17101",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/17101"
},
{
"name": "15499",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/15499"
},
{
"name": "sawmill-unknown-gain-access(20879)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "sawmill-unknown-add-license(20880)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-06-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "17100",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/17100"
},
{
"name": "1014106",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1014106"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"name": "17101",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/17101"
},
{
"name": "15499",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/15499"
},
{
"name": "sawmill-unknown-gain-access(20879)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "sawmill-unknown-add-license(20880)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-1900",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "17100",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/17100"
},
{
"name": "1014106",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014106"
},
{
"name": "http://www.networksecurity.fi/advisories/sawmill-admin.html",
"refsource": "MISC",
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"name": "17101",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/17101"
},
{
"name": "15499",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15499"
},
{
"name": "sawmill-unknown-gain-access(20879)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
},
{
"name": "http://www.sawmill.net/version_history7.html",
"refsource": "CONFIRM",
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "sawmill-unknown-add-license(20880)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-1900",
"datePublished": "2005-06-08T04:00:00",
"dateReserved": "2005-06-08T00:00:00",
"dateUpdated": "2024-08-07T22:06:57.723Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-1901 (GCVE-0-2005-1901)
Vulnerability from cvelistv5 – Published: 2005-06-08 04:00 – Updated: 2024-08-07 22:06
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:06:57.810Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "17102",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/17102"
},
{
"name": "17103",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/17103"
},
{
"name": "1014106",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1014106"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"name": "15499",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/15499"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "sawmill-add-user-xss(20881)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-06-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "17102",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/17102"
},
{
"name": "17103",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/17103"
},
{
"name": "1014106",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1014106"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"name": "15499",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/15499"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "sawmill-add-user-xss(20881)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-1901",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "17102",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/17102"
},
{
"name": "17103",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/17103"
},
{
"name": "1014106",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014106"
},
{
"name": "http://www.networksecurity.fi/advisories/sawmill-admin.html",
"refsource": "MISC",
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"name": "15499",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15499"
},
{
"name": "http://www.sawmill.net/version_history7.html",
"refsource": "CONFIRM",
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "sawmill-add-user-xss(20881)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-1901",
"datePublished": "2005-06-08T04:00:00",
"dateReserved": "2005-06-08T00:00:00",
"dateUpdated": "2024-08-07T22:06:57.810Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0265 (GCVE-0-2002-0265)
Vulnerability from cvelistv5 – Published: 2002-06-25 04:00 – Updated: 2024-08-08 02:42
VLAI?
Summary
Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:42:28.540Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sawmill.net/version_history.html"
},
{
"name": "4077",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4077"
},
{
"name": "sawmill-admin-password-insecure(8173)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/8173.php"
},
{
"name": "20020211 Vulnerability in Sawmill for Solaris v. 6.2.14",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-02-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-05-09T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sawmill.net/version_history.html"
},
{
"name": "4077",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4077"
},
{
"name": "sawmill-admin-password-insecure(8173)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/8173.php"
},
{
"name": "20020211 Vulnerability in Sawmill for Solaris v. 6.2.14",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0265",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.sawmill.net/version_history.html",
"refsource": "CONFIRM",
"url": "http://www.sawmill.net/version_history.html"
},
{
"name": "4077",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4077"
},
{
"name": "sawmill-admin-password-insecure(8173)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8173.php"
},
{
"name": "20020211 Vulnerability in Sawmill for Solaris v. 6.2.14",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0265",
"datePublished": "2002-06-25T04:00:00",
"dateReserved": "2002-05-01T00:00:00",
"dateUpdated": "2024-08-08T02:42:28.540Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2000-0588 (GCVE-0-2000-0588)
Vulnerability from cvelistv5 – Published: 2000-10-13 04:00 – Updated: 2024-08-08 05:21
VLAI?
Summary
SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T05:21:31.286Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
},
{
"name": "1402",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/1402"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2000-06-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-11-02T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
},
{
"name": "1402",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/1402"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2000-0588",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
},
{
"name": "1402",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1402"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2000-0588",
"datePublished": "2000-10-13T04:00:00",
"dateReserved": "2000-07-19T00:00:00",
"dateUpdated": "2024-08-08T05:21:31.286Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2000-0589 (GCVE-0-2000-0589)
Vulnerability from cvelistv5 – Published: 2000-07-19 04:00 – Updated: 2024-08-08 05:21
VLAI?
Summary
SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T05:21:31.287Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"name": "1403",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/1403"
},
{
"name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2000-06-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2003-03-21T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"name": "1403",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/1403"
},
{
"name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2000-0589",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"name": "1403",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1403"
},
{
"name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2000-0589",
"datePublished": "2000-07-19T04:00:00",
"dateReserved": "2000-07-19T00:00:00",
"dateUpdated": "2024-08-08T05:21:31.287Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-5496 (GCVE-0-2017-5496)
Vulnerability from nvd – Published: 2017-03-15 15:00 – Updated: 2024-08-05 15:04
VLAI?
Summary
Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T15:04:14.702Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "41395",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/41395/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
},
{
"name": "20170221 Sawmill Enterprise v8.7.9 Pass The Hash Authentication Bypass",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2017/Feb/46"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-02-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-31T09:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "41395",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/41395/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
},
{
"name": "20170221 Sawmill Enterprise v8.7.9 Pass The Hash Authentication Bypass",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2017/Feb/46"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-5496",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "41395",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41395/"
},
{
"name": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
},
{
"name": "20170221 Sawmill Enterprise v8.7.9 Pass The Hash Authentication Bypass",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2017/Feb/46"
},
{
"name": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt",
"refsource": "MISC",
"url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-5496",
"datePublished": "2017-03-15T15:00:00",
"dateReserved": "2017-01-15T00:00:00",
"dateUpdated": "2024-08-05T15:04:14.702Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4947 (GCVE-0-2013-4947)
Vulnerability from nvd – Published: 2013-07-29 23:00 – Updated: 2024-08-06 16:59
VLAI?
Summary
Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:59:41.078Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "54090",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/54090"
},
{
"name": "95059",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/95059"
},
{
"name": "61075",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/61075"
},
{
"name": "sawmill-database-unspecified(85544)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sawmill.net/version_history8.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-07-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "54090",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/54090"
},
{
"name": "95059",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/95059"
},
{
"name": "61075",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/61075"
},
{
"name": "sawmill-database-unspecified(85544)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sawmill.net/version_history8.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-4947",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "54090",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54090"
},
{
"name": "95059",
"refsource": "OSVDB",
"url": "http://osvdb.org/95059"
},
{
"name": "61075",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61075"
},
{
"name": "sawmill-database-unspecified(85544)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
},
{
"name": "http://www.sawmill.net/version_history8.html",
"refsource": "CONFIRM",
"url": "http://www.sawmill.net/version_history8.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-4947",
"datePublished": "2013-07-29T23:00:00",
"dateReserved": "2013-07-29T00:00:00",
"dateUpdated": "2024-08-06T16:59:41.078Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-1079 (GCVE-0-2010-1079)
Vulnerability from nvd – Published: 2010-03-23 19:00 – Updated: 2024-09-16 17:33
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T01:14:05.359Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "38730",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38730"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "38387",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/38387"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-03-23T19:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "38730",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38730"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "38387",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/38387"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-1079",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "38730",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38730"
},
{
"name": "http://www.sawmill.net/version_history7.html",
"refsource": "CONFIRM",
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "38387",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38387"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-1079",
"datePublished": "2010-03-23T19:00:00Z",
"dateReserved": "2010-03-23T00:00:00Z",
"dateUpdated": "2024-09-16T17:33:26.616Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-2950 (GCVE-0-2005-2950)
Vulnerability from nvd – Published: 2005-09-16 04:00 – Updated: 2024-08-07 22:53
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:53:29.927Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sawmill.net/version_history.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
},
{
"name": "16744",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/16744/"
},
{
"name": "sawmill-unknown-xss(22206)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
},
{
"name": "20050912 Sawmill XSS vuln",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
},
{
"name": "1",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-09-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sawmill.net/version_history.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
},
{
"name": "16744",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/16744/"
},
{
"name": "sawmill-unknown-xss(22206)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
},
{
"name": "20050912 Sawmill XSS vuln",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
},
{
"name": "1",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-2950",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.sawmill.net/version_history.html",
"refsource": "CONFIRM",
"url": "http://www.sawmill.net/version_history.html"
},
{
"name": "http://www.nta-monitor.com/news/xss/sawmill/index.htm",
"refsource": "MISC",
"url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
},
{
"name": "16744",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16744/"
},
{
"name": "sawmill-unknown-xss(22206)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
},
{
"name": "20050912 Sawmill XSS vuln",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
},
{
"name": "1",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-2950",
"datePublished": "2005-09-16T04:00:00",
"dateReserved": "2005-09-16T00:00:00",
"dateUpdated": "2024-08-07T22:53:29.927Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-1900 (GCVE-0-2005-1900)
Vulnerability from nvd – Published: 2005-06-08 04:00 – Updated: 2024-08-07 22:06
VLAI?
Summary
Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:06:57.723Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "17100",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/17100"
},
{
"name": "1014106",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1014106"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"name": "17101",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/17101"
},
{
"name": "15499",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/15499"
},
{
"name": "sawmill-unknown-gain-access(20879)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "sawmill-unknown-add-license(20880)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-06-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "17100",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/17100"
},
{
"name": "1014106",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1014106"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"name": "17101",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/17101"
},
{
"name": "15499",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/15499"
},
{
"name": "sawmill-unknown-gain-access(20879)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "sawmill-unknown-add-license(20880)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-1900",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "17100",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/17100"
},
{
"name": "1014106",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014106"
},
{
"name": "http://www.networksecurity.fi/advisories/sawmill-admin.html",
"refsource": "MISC",
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"name": "17101",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/17101"
},
{
"name": "15499",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15499"
},
{
"name": "sawmill-unknown-gain-access(20879)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
},
{
"name": "http://www.sawmill.net/version_history7.html",
"refsource": "CONFIRM",
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "sawmill-unknown-add-license(20880)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-1900",
"datePublished": "2005-06-08T04:00:00",
"dateReserved": "2005-06-08T00:00:00",
"dateUpdated": "2024-08-07T22:06:57.723Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-1901 (GCVE-0-2005-1901)
Vulnerability from nvd – Published: 2005-06-08 04:00 – Updated: 2024-08-07 22:06
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:06:57.810Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "17102",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/17102"
},
{
"name": "17103",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/17103"
},
{
"name": "1014106",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1014106"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"name": "15499",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/15499"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "sawmill-add-user-xss(20881)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-06-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "17102",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/17102"
},
{
"name": "17103",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/17103"
},
{
"name": "1014106",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1014106"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"name": "15499",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/15499"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "sawmill-add-user-xss(20881)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-1901",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "17102",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/17102"
},
{
"name": "17103",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/17103"
},
{
"name": "1014106",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014106"
},
{
"name": "http://www.networksecurity.fi/advisories/sawmill-admin.html",
"refsource": "MISC",
"url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
},
{
"name": "15499",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15499"
},
{
"name": "http://www.sawmill.net/version_history7.html",
"refsource": "CONFIRM",
"url": "http://www.sawmill.net/version_history7.html"
},
{
"name": "sawmill-add-user-xss(20881)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-1901",
"datePublished": "2005-06-08T04:00:00",
"dateReserved": "2005-06-08T00:00:00",
"dateUpdated": "2024-08-07T22:06:57.810Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0265 (GCVE-0-2002-0265)
Vulnerability from nvd – Published: 2002-06-25 04:00 – Updated: 2024-08-08 02:42
VLAI?
Summary
Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:42:28.540Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sawmill.net/version_history.html"
},
{
"name": "4077",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4077"
},
{
"name": "sawmill-admin-password-insecure(8173)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/8173.php"
},
{
"name": "20020211 Vulnerability in Sawmill for Solaris v. 6.2.14",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-02-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-05-09T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sawmill.net/version_history.html"
},
{
"name": "4077",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4077"
},
{
"name": "sawmill-admin-password-insecure(8173)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/8173.php"
},
{
"name": "20020211 Vulnerability in Sawmill for Solaris v. 6.2.14",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0265",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.sawmill.net/version_history.html",
"refsource": "CONFIRM",
"url": "http://www.sawmill.net/version_history.html"
},
{
"name": "4077",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4077"
},
{
"name": "sawmill-admin-password-insecure(8173)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8173.php"
},
{
"name": "20020211 Vulnerability in Sawmill for Solaris v. 6.2.14",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0265",
"datePublished": "2002-06-25T04:00:00",
"dateReserved": "2002-05-01T00:00:00",
"dateUpdated": "2024-08-08T02:42:28.540Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2000-0588 (GCVE-0-2000-0588)
Vulnerability from nvd – Published: 2000-10-13 04:00 – Updated: 2024-08-08 05:21
VLAI?
Summary
SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T05:21:31.286Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
},
{
"name": "1402",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/1402"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2000-06-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-11-02T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
},
{
"name": "1402",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/1402"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2000-0588",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
},
{
"name": "1402",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1402"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2000-0588",
"datePublished": "2000-10-13T04:00:00",
"dateReserved": "2000-07-19T00:00:00",
"dateUpdated": "2024-08-08T05:21:31.286Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2000-0589 (GCVE-0-2000-0589)
Vulnerability from nvd – Published: 2000-07-19 04:00 – Updated: 2024-08-08 05:21
VLAI?
Summary
SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T05:21:31.287Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"name": "1403",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/1403"
},
{
"name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2000-06-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2003-03-21T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"name": "1403",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/1403"
},
{
"name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2000-0589",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
},
{
"name": "1403",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1403"
},
{
"name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2000-0589",
"datePublished": "2000-07-19T04:00:00",
"dateReserved": "2000-07-19T00:00:00",
"dateUpdated": "2024-08-08T05:21:31.287Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}