Search criteria

27 vulnerabilities found for sawmill by sawmill

FKIE_CVE-2017-5496

Vulnerability from fkie_nvd - Published: 2017-03-15 15:59 - Updated: 2025-04-20 01:37

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.7.9:*:*:*:*:enterprise:*:*",
              "matchCriteriaId": "F134D70D-D84A-4BB9-A1CB-E4FF2509AE1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash."
    },
    {
      "lang": "es",
      "value": "Sawmill Enterprise 8.7.9 permite a atacantes remotos obtener acceso al inicio de sesi\u00f3n aprovechando el conocimiento de un hash de contrase\u00f1a."
    }
  ],
  "id": "CVE-2017-5496",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-15T15:59:00.640",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2017/Feb/46"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/41395/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2017/Feb/46"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/41395/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-4947

Vulnerability from fkie_nvd - Published: 2013-07-29 23:27 - Updated: 2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E62E62A-D0A5-4CDF-805F-8B6D70F6D481",
              "versionEndIncluding": "8.6.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60558951-0526-4E73-BAFC-C649EC962C22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "18833838-1EE9-4E04-B849-735EAF9DDAFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "507A39DC-6C76-4F46-9448-925358DB9906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "7A988A88-7B0E-4D8E-B92D-E4BFE78E0C51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "DE7D1432-5421-4219-9332-6FF181ADF73D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "8737C0FB-04F1-41FF-92F8-D4EC65EE78D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "E5DB8D8A-6519-49BF-B7BA-B4A96FDDDD54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "06238BAD-1AA8-44A7-A6CE-66E56BFBBFA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "23A95EC4-41AB-4ACC-9A46-CCE9C12ADAFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "788DEA64-756D-42C2-B372-5C245D5FEC7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BCD1671-64B1-430A-ABC3-EC9FA9126DDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "01A6E211-EB2F-426C-A18D-89EB98AF77A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "84932781-1B2E-4E75-BC7F-73088D981413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "838C2320-00E2-4530-8DE6-115D29402B00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C59A713A-41D3-4C3D-BC1A-4FAE09E2D61D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "356C46DC-4D33-4AC5-BB20-0D9BEF4A168C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ED32E07-219A-402D-9B02-72A51CC543CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD4C113D-DFCD-4D2F-93C5-C5C138C920D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DC614A-EC58-42AA-BA30-2695EE2B3463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A344DAE7-5D69-40E7-8D46-82E57FF0823B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CC5E95C-EA0F-4914-A8FF-E9733B52C1E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFD86C9B-701C-456F-8D9F-D014FBBC3DB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ABE34D6-35C0-4F6E-AD35-C0AD8C58CE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA79B292-21F3-49B7-88CE-532166B38A24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "62EDA9B5-5870-4B71-94A9-988E157C4D2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "50A1139A-AAD0-488A-BC0E-59070D078545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED19F7DB-0AE2-4781-ABE7-4AB1C0E018EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D150D134-7D5D-4B27-8033-055D4FDC17B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70CC121-204C-4119-AC2E-251DE2D4233D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.5:b3:*:*:*:*:*:*",
              "matchCriteriaId": "50F187E1-F665-49FA-BA8E-70346775536B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.5:b4:*:*:*:*:*:*",
              "matchCriteriaId": "15098288-454D-4BB1-9675-D62BDDD3A38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.5:b5:*:*:*:*:*:*",
              "matchCriteriaId": "A8103A2E-C9D1-4859-9D74-E266CBE5BE03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8EF5819-8803-476A-9FA8-0B4B0B52764E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3972D4C8-4551-413C-94A1-DDEDC87E976A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "65739DAB-BD70-4C90-8381-012374E680F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B03A3E7-4ED5-4C0B-9DFB-8DC4B78ED2DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A7442A0-5FAD-4AD6-893F-2A079FE83B6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "111DBA57-B408-44DE-9980-E30C3DA9F799",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F712D30-8B30-4C44-99C6-52C9B173350D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "70759888-22D2-423B-8320-1807AA150239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2657E7F6-5A0B-4012-82C5-BF17CE31640A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "60603472-F885-4F3F-B8EC-9223DF27CF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6FAA0BB-5103-42AF-9B75-FD5A00CAFFA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:8.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76E89B85-4E1F-4CB3-8434-521C49F4E18B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la base de datos update y build de Sawmill anterior a 8.6.3, permite a atacantes remotos provocar un impacto y vectores de ataque desconocidos."
    }
  ],
  "id": "CVE-2013-4947",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-07-29T23:27:49.883",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/95059"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54090"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.sawmill.net/version_history8.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/61075"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/95059"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54090"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.sawmill.net/version_history8.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/61075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2010-1079

Vulnerability from fkie_nvd - Published: 2010-03-23 19:30 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
sawmill sawmill *
sawmill sawmill 5.0.21
sawmill sawmill 6.2
sawmill sawmill 6.2.1
sawmill sawmill 6.2.2
sawmill sawmill 6.2.3
sawmill sawmill 6.2.4
sawmill sawmill 6.2.5
sawmill sawmill 6.2.6
sawmill sawmill 6.2.7
sawmill sawmill 6.2.8
sawmill sawmill 6.2.8a
sawmill sawmill 6.2.9
sawmill sawmill 6.2.10
sawmill sawmill 6.2.11
sawmill sawmill 6.2.12
sawmill sawmill 6.2.13
sawmill sawmill 6.2.14
sawmill sawmill 7.0.0
sawmill sawmill 7.0.1
sawmill sawmill 7.0.2
sawmill sawmill 7.0.3
sawmill sawmill 7.0.4
sawmill sawmill 7.0.5
sawmill sawmill 7.0.6
sawmill sawmill 7.0.7
sawmill sawmill 7.0.8
sawmill sawmill 7.0.9
sawmill sawmill 7.0.10
sawmill sawmill 7.0.10a
sawmill sawmill 7.0.10b
sawmill sawmill 7.0.10c
sawmill sawmill 7.0.10d
sawmill sawmill 7.0.10e
sawmill sawmill 7.0.10f
sawmill sawmill 7.0.10g
sawmill sawmill 7.0.10h
sawmill sawmill 7.0.10i
sawmill sawmill 7.0.10j
sawmill sawmill 7.0.10k
sawmill sawmill 7.1
sawmill sawmill 7.1.1
sawmill sawmill 7.1.1b
sawmill sawmill 7.1.2
sawmill sawmill 7.1.3
sawmill sawmill 7.1.4
sawmill sawmill 7.1.5
sawmill sawmill 7.1.6
sawmill sawmill 7.1.7
sawmill sawmill 7.1.8
sawmill sawmill 7.1.9
sawmill sawmill 7.1.10
sawmill sawmill 7.1.11
sawmill sawmill 7.1.12
sawmill sawmill 7.1.13
sawmill sawmill 7.1.14
sawmill sawmill 7.2
sawmill sawmill 7.2.1
sawmill sawmill 7.2.2
sawmill sawmill 7.2.3
sawmill sawmill 7.2.4
sawmill sawmill 7.2.5
sawmill sawmill 7.2.6
sawmill sawmill 7.2.7
sawmill sawmill 7.2.8
sawmill sawmill 7.2.9
sawmill sawmill 7.2.10
sawmill sawmill 7.2.11
sawmill sawmill 7.2.12
sawmill sawmill 7.2.13
sawmill sawmill 7.2.14
sawmill sawmill 7.2.15
sawmill sawmill 7.2.16

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25AF224F-F061-42A6-9A11-5691DE7A1E05",
              "versionEndIncluding": "7.2.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4673D2AA-E1BE-4809-94BE-7C6951E9D2D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D715DBC-1C22-409E-8FA2-900B91CC75E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B13F794-F9BD-401E-BD7A-12A17579A4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "81813438-B42F-4847-97B4-18DD570C135E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9625F905-9935-45F4-838F-6D70F8F650A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D316B5D-5D25-46C8-962E-D70141A1450F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0BB9C09-307F-40FA-8EC2-E5E032558A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB94450D-4EB4-4ACB-9D8C-0598F17207F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "634445B5-0C74-4EC1-B4B4-9CBDFC1BD8E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E039D3AD-F228-4079-A039-D9F11F7EF27E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CFE4AB2-2A37-4E49-9048-2E4BBF0DB4B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0F358C2-1385-4D2C-A864-E72D73005DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D33B82-9DEA-40DC-802E-6E3033DB6A51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2DB6C05-FE96-4789-A846-9BD997D0B925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31CD272-8758-4307-8CA4-BC7F0CCB6167",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "50BFC413-C0CF-4B15-899A-63D41FA93CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "721B53C7-E1D8-4F7F-93C5-87E414FB3BEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F60FCBD-D8B1-4E69-B8C3-32659106B636",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44518027-BCA4-45E5-8416-75FE36AD6D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "21913F12-4790-487D-84F4-48EB09AB042A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D6CC4EE-265E-47D2-B820-ACB4EF100953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDC8E37-ADF0-452D-A344-8A93ACB89D26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A78385D9-4652-48ED-A5E7-F50340D70F0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "27A6E5F4-73AF-4BDB-A2B4-2F24064F1D21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FD29FBC-959E-4EBA-9C5A-7B6BCF53A2C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C91865B-6527-466D-A88D-17E1CC8A1B89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAAFA876-B95A-40E5-9E42-8B37315BDE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E3D5C1E-80B7-413B-B49D-8DE6CC919770",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10a:*:*:*:*:*:*:*",
              "matchCriteriaId": "06D5321E-DE25-4FC4-81EC-E6C9EC7BA836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10b:*:*:*:*:*:*:*",
              "matchCriteriaId": "B790CF30-97C7-46A2-A300-E4D417870DEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10c:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A328FB8-ECC3-47D8-82B4-89372DD9A324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10d:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FC7D8F1-454E-43A5-A886-3EA91E05F3DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10e:*:*:*:*:*:*:*",
              "matchCriteriaId": "1916BD3D-51AF-4A25-8EAA-018C84B58B6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10f:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B1DB0AB-5BC6-4C26-8223-E6F11FDC8293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10g:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BD07081-4460-4633-AE01-36BEE03193A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10h:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE8B60B1-DA99-46BC-AA84-0D5D620D6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10i:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB2979BD-01B9-4BF3-9C24-E529D11F435C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10j:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF43285-C448-436D-9089-C6D97802DCDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10k:*:*:*:*:*:*:*",
              "matchCriteriaId": "65814DFE-6E73-4C78-BAAA-B7FBA9FBF526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A088B4E4-9A13-4F39-9708-40529410AB03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F21B42F-56C2-422C-BFC8-701EDDCBE9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "B544D35C-3793-4656-92FC-F8BE72AC98F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A84B18-C5EA-4038-8123-1C9C2511BBCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "68176849-3128-4112-BCF0-577253552456",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE9E422E-7EB8-407D-9DC4-4CCB83FAC834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7887413C-0F1B-4EBC-8E97-8ECC9EB8336D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9F909B4-62F6-4FD4-A0FB-F0BE918A2553",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F95EF53-7961-42A8-9BC5-0C53D6E81925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1737B143-D96E-4B6F-9623-E5F41EB70074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF662B3-B127-4EB4-AD53-E528E626356C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "830F3AE5-B93F-48E4-B6EB-A5D2974274E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCF0A754-420A-483E-BCD4-A46FC034D587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF319AD0-BEEB-4348-A0BE-EAB4DB1D7F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C200EAB1-5F45-408D-BF1B-BEDAD2B1C06B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5873ED-6E24-414A-92E9-01CE03C83284",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E6BA0A-2B7C-4AC6-B71E-613C70AE645F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0444940C-6F47-4F03-896C-FB5EB0A1DDEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC22C387-CFFE-4AE5-8F46-0CBF15974C84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AE436E1-E4A3-4BAC-87AE-F11702425251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDAD10F0-E352-41CC-8413-A4D839127B5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF89CDA-312D-4399-8E46-1A6431C979C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ABE7D3C-3FA2-47B5-A151-656C2FCCAAB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "35B2D63E-3C1D-4858-9BC7-C891944D1543",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E0A5B19-A34A-47F1-ACA5-2D48F05FF278",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA89A7B8-0A38-4669-8AAD-325C409044A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D32128A-480F-40D5-9C18-87035390BEC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "59B0F738-5CEE-4542-9E26-04AF8D90E988",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C42BC9D-6D88-458D-AC03-031DD27E1733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "868D1999-47B8-4A13-AA15-DB3D3CF22C91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3AA3CD-29CA-48F1-AAAC-BF68EB8EEA7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8CF4632-3979-4AA6-A0AB-3CE378488F41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C94767C-7488-4662-9105-BA3D2C61DD52",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Sawmill anteriores a la v7.2.18 permite a atacantes remotos inyectar secuencias de comandos web o HTML de forma arbitraria a trav\u00e9s de vectores inespec\u00edficos."
    }
  ],
  "id": "CVE-2010-1079",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-03-23T19:30:00.627",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38730"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.sawmill.net/version_history7.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/38387"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38730"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.sawmill.net/version_history7.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/38387"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-2950

Vulnerability from fkie_nvd - Published: 2005-09-16 22:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request.
Impacted products
Vendor Product Version
sawmill sawmill 7.0.0
sawmill sawmill 7.0.1
sawmill sawmill 7.0.2
sawmill sawmill 7.0.3
sawmill sawmill 7.0.4
sawmill sawmill 7.0.5
sawmill sawmill 7.0.6
sawmill sawmill 7.0.7
sawmill sawmill 7.0.8
sawmill sawmill 7.0.9
sawmill sawmill 7.0.10
sawmill sawmill 7.0.10a
sawmill sawmill 7.0.10b
sawmill sawmill 7.0.10c
sawmill sawmill 7.0.10d
sawmill sawmill 7.0.10e
sawmill sawmill 7.0.10f
sawmill sawmill 7.0.10g
sawmill sawmill 7.0.10h
sawmill sawmill 7.0.10i
sawmill sawmill 7.0.10j
sawmill sawmill 7.0.10k
sawmill sawmill 7.1
sawmill sawmill 7.1.1
sawmill sawmill 7.1.2
sawmill sawmill 7.1.3
sawmill sawmill 7.1.4
sawmill sawmill 7.1.5
sawmill sawmill 7.1.6
sawmill sawmill 7.1.7
sawmill sawmill 7.1.8
sawmill sawmill 7.1.9
sawmill sawmill 7.1.10
sawmill sawmill 7.1.11
sawmill sawmill 7.1.12
sawmill sawmill 7.1.13
sawmill sawmill 7.1.14

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F60FCBD-D8B1-4E69-B8C3-32659106B636",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44518027-BCA4-45E5-8416-75FE36AD6D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "21913F12-4790-487D-84F4-48EB09AB042A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D6CC4EE-265E-47D2-B820-ACB4EF100953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDC8E37-ADF0-452D-A344-8A93ACB89D26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A78385D9-4652-48ED-A5E7-F50340D70F0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "27A6E5F4-73AF-4BDB-A2B4-2F24064F1D21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FD29FBC-959E-4EBA-9C5A-7B6BCF53A2C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C91865B-6527-466D-A88D-17E1CC8A1B89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAAFA876-B95A-40E5-9E42-8B37315BDE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E3D5C1E-80B7-413B-B49D-8DE6CC919770",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10a:*:*:*:*:*:*:*",
              "matchCriteriaId": "06D5321E-DE25-4FC4-81EC-E6C9EC7BA836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10b:*:*:*:*:*:*:*",
              "matchCriteriaId": "B790CF30-97C7-46A2-A300-E4D417870DEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10c:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A328FB8-ECC3-47D8-82B4-89372DD9A324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10d:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FC7D8F1-454E-43A5-A886-3EA91E05F3DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10e:*:*:*:*:*:*:*",
              "matchCriteriaId": "1916BD3D-51AF-4A25-8EAA-018C84B58B6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10f:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B1DB0AB-5BC6-4C26-8223-E6F11FDC8293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10g:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BD07081-4460-4633-AE01-36BEE03193A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10h:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE8B60B1-DA99-46BC-AA84-0D5D620D6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10i:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB2979BD-01B9-4BF3-9C24-E529D11F435C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10j:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF43285-C448-436D-9089-C6D97802DCDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.0.10k:*:*:*:*:*:*:*",
              "matchCriteriaId": "65814DFE-6E73-4C78-BAAA-B7FBA9FBF526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A088B4E4-9A13-4F39-9708-40529410AB03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F21B42F-56C2-422C-BFC8-701EDDCBE9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A84B18-C5EA-4038-8123-1C9C2511BBCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "68176849-3128-4112-BCF0-577253552456",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE9E422E-7EB8-407D-9DC4-4CCB83FAC834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7887413C-0F1B-4EBC-8E97-8ECC9EB8336D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9F909B4-62F6-4FD4-A0FB-F0BE918A2553",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F95EF53-7961-42A8-9BC5-0C53D6E81925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1737B143-D96E-4B6F-9623-E5F41EB70074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF662B3-B127-4EB4-AD53-E528E626356C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "830F3AE5-B93F-48E4-B6EB-A5D2974274E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCF0A754-420A-483E-BCD4-A46FC034D587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF319AD0-BEEB-4348-A0BE-EAB4DB1D7F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C200EAB1-5F45-408D-BF1B-BEDAD2B1C06B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5873ED-6E24-414A-92E9-01CE03C83284",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request."
    }
  ],
  "id": "CVE-2005-2950",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-09-16T22:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/16744/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.sawmill.net/version_history.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/16744/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.sawmill.net/version_history.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-1901

Vulnerability from fkie_nvd - Published: 2005-06-09 04:00 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A07AAC45-78A1-48B2-9C47-D8E6A8D6CE1D",
              "versionEndIncluding": "7.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F21B42F-56C2-422C-BFC8-701EDDCBE9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "B544D35C-3793-4656-92FC-F8BE72AC98F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A84B18-C5EA-4038-8123-1C9C2511BBCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "68176849-3128-4112-BCF0-577253552456",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE9E422E-7EB8-407D-9DC4-4CCB83FAC834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7887413C-0F1B-4EBC-8E97-8ECC9EB8336D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page."
    }
  ],
  "id": "CVE-2005-1901",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-06-09T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/15499"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1014106"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/17102"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/17103"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.sawmill.net/version_history7.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/15499"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1014106"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/17102"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/17103"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.sawmill.net/version_history7.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-1900

Vulnerability from fkie_nvd - Published: 2005-06-09 04:00 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A07AAC45-78A1-48B2-9C47-D8E6A8D6CE1D",
              "versionEndIncluding": "7.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F21B42F-56C2-422C-BFC8-701EDDCBE9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "B544D35C-3793-4656-92FC-F8BE72AC98F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A84B18-C5EA-4038-8123-1C9C2511BBCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "68176849-3128-4112-BCF0-577253552456",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE9E422E-7EB8-407D-9DC4-4CCB83FAC834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:7.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7887413C-0F1B-4EBC-8E97-8ECC9EB8336D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license."
    }
  ],
  "id": "CVE-2005-1900",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-06-09T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/15499"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1014106"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/17100"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/17101"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.sawmill.net/version_history7.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/15499"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1014106"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/17100"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/17101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.sawmill.net/version_history7.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2002-0265

Vulnerability from fkie_nvd - Published: 2002-05-29 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file.
Impacted products
Vendor Product Version
sawmill sawmill 6.2
sawmill sawmill 6.2.1
sawmill sawmill 6.2.2
sawmill sawmill 6.2.3
sawmill sawmill 6.2.4
sawmill sawmill 6.2.5
sawmill sawmill 6.2.6
sawmill sawmill 6.2.7
sawmill sawmill 6.2.8
sawmill sawmill 6.2.8a
sawmill sawmill 6.2.9
sawmill sawmill 6.2.10
sawmill sawmill 6.2.11
sawmill sawmill 6.2.12
sawmill sawmill 6.2.13
sawmill sawmill 6.2.14

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D715DBC-1C22-409E-8FA2-900B91CC75E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B13F794-F9BD-401E-BD7A-12A17579A4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "81813438-B42F-4847-97B4-18DD570C135E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9625F905-9935-45F4-838F-6D70F8F650A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D316B5D-5D25-46C8-962E-D70141A1450F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0BB9C09-307F-40FA-8EC2-E5E032558A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB94450D-4EB4-4ACB-9D8C-0598F17207F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "634445B5-0C74-4EC1-B4B4-9CBDFC1BD8E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E039D3AD-F228-4079-A039-D9F11F7EF27E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CFE4AB2-2A37-4E49-9048-2E4BBF0DB4B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0F358C2-1385-4D2C-A864-E72D73005DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D33B82-9DEA-40DC-802E-6E3033DB6A51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2DB6C05-FE96-4789-A846-9BD997D0B925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31CD272-8758-4307-8CA4-BC7F0CCB6167",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "50BFC413-C0CF-4B15-899A-63D41FA93CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:6.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "721B53C7-E1D8-4F7F-93C5-87E414FB3BEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file."
    },
    {
      "lang": "es",
      "value": "Sendmail para Solaris 6.2.14 y anteriores crea el fichero AdminPassword con permisos de escritura para todo el mundo. Esto permite que usuarios locales obtengan privilegios modificando este fichero."
    }
  ],
  "id": "CVE-2002-0265",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-05-29T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/8173.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.sawmill.net/version_history.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/4077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/8173.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.sawmill.net/version_history.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/4077"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2000-0588

Vulnerability from fkie_nvd - Published: 2000-06-26 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands.
Impacted products
Vendor Product Version
sawmill sawmill 5.0.21

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4673D2AA-E1BE-4809-94BE-7C6951E9D2D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands."
    }
  ],
  "id": "CVE-2000-0588",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-06-26T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/1402"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/1402"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2000-0589

Vulnerability from fkie_nvd - Published: 2000-06-26 04:00 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sawmill:sawmill:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4673D2AA-E1BE-4809-94BE-7C6951E9D2D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration."
    }
  ],
  "id": "CVE-2000-0589",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-06-26T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/1403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/1403"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2017-5496 (GCVE-0-2017-5496)

Vulnerability from cvelistv5 – Published: 2017-03-15 15:00 – Updated: 2024-08-05 15:04
VLAI?
Summary
Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:04:14.702Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "41395",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/41395/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
          },
          {
            "name": "20170221 Sawmill Enterprise v8.7.9 Pass The Hash Authentication Bypass",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2017/Feb/46"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-02-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-31T09:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "41395",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/41395/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
        },
        {
          "name": "20170221 Sawmill Enterprise v8.7.9 Pass The Hash Authentication Bypass",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2017/Feb/46"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-5496",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "41395",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/41395/"
            },
            {
              "name": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
            },
            {
              "name": "20170221 Sawmill Enterprise v8.7.9 Pass The Hash Authentication Bypass",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2017/Feb/46"
            },
            {
              "name": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt",
              "refsource": "MISC",
              "url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-5496",
    "datePublished": "2017-03-15T15:00:00",
    "dateReserved": "2017-01-15T00:00:00",
    "dateUpdated": "2024-08-05T15:04:14.702Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4947 (GCVE-0-2013-4947)

Vulnerability from cvelistv5 – Published: 2013-07-29 23:00 – Updated: 2024-08-06 16:59
VLAI?
Summary
Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/54090 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/95059 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/61075 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.sawmill.net/version_history8.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:59:41.078Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "54090",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54090"
          },
          {
            "name": "95059",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/95059"
          },
          {
            "name": "61075",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/61075"
          },
          {
            "name": "sawmill-database-unspecified(85544)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sawmill.net/version_history8.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "54090",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54090"
        },
        {
          "name": "95059",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/95059"
        },
        {
          "name": "61075",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/61075"
        },
        {
          "name": "sawmill-database-unspecified(85544)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sawmill.net/version_history8.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-4947",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "54090",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54090"
            },
            {
              "name": "95059",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/95059"
            },
            {
              "name": "61075",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/61075"
            },
            {
              "name": "sawmill-database-unspecified(85544)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
            },
            {
              "name": "http://www.sawmill.net/version_history8.html",
              "refsource": "CONFIRM",
              "url": "http://www.sawmill.net/version_history8.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-4947",
    "datePublished": "2013-07-29T23:00:00",
    "dateReserved": "2013-07-29T00:00:00",
    "dateUpdated": "2024-08-06T16:59:41.078Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-1079 (GCVE-0-2010-1079)

Vulnerability from cvelistv5 – Published: 2010-03-23 19:00 – Updated: 2024-09-16 17:33
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/38730 third-party-advisoryx_refsource_SECUNIA
http://www.sawmill.net/version_history7.html x_refsource_CONFIRM
http://www.securityfocus.com/bid/38387 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:14:05.359Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "38730",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38730"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sawmill.net/version_history7.html"
          },
          {
            "name": "38387",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/38387"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-03-23T19:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "38730",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38730"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sawmill.net/version_history7.html"
        },
        {
          "name": "38387",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/38387"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-1079",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "38730",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38730"
            },
            {
              "name": "http://www.sawmill.net/version_history7.html",
              "refsource": "CONFIRM",
              "url": "http://www.sawmill.net/version_history7.html"
            },
            {
              "name": "38387",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/38387"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-1079",
    "datePublished": "2010-03-23T19:00:00Z",
    "dateReserved": "2010-03-23T00:00:00Z",
    "dateUpdated": "2024-09-16T17:33:26.616Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2950 (GCVE-0-2005-2950)

Vulnerability from cvelistv5 – Published: 2005-09-16 04:00 – Updated: 2024-08-07 22:53
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:53:29.927Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sawmill.net/version_history.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
          },
          {
            "name": "16744",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16744/"
          },
          {
            "name": "sawmill-unknown-xss(22206)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
          },
          {
            "name": "20050912 Sawmill XSS vuln",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
          },
          {
            "name": "1",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-09-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sawmill.net/version_history.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
        },
        {
          "name": "16744",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16744/"
        },
        {
          "name": "sawmill-unknown-xss(22206)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
        },
        {
          "name": "20050912 Sawmill XSS vuln",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
        },
        {
          "name": "1",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2950",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.sawmill.net/version_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.sawmill.net/version_history.html"
            },
            {
              "name": "http://www.nta-monitor.com/news/xss/sawmill/index.htm",
              "refsource": "MISC",
              "url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
            },
            {
              "name": "16744",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16744/"
            },
            {
              "name": "sawmill-unknown-xss(22206)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
            },
            {
              "name": "20050912 Sawmill XSS vuln",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
            },
            {
              "name": "1",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2950",
    "datePublished": "2005-09-16T04:00:00",
    "dateReserved": "2005-09-16T00:00:00",
    "dateUpdated": "2024-08-07T22:53:29.927Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-1900 (GCVE-0-2005-1900)

Vulnerability from cvelistv5 – Published: 2005-06-08 04:00 – Updated: 2024-08-07 22:06
VLAI?
Summary
Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.osvdb.org/17100 vdb-entryx_refsource_OSVDB
http://securitytracker.com/id?1014106 vdb-entryx_refsource_SECTRACK
http://www.networksecurity.fi/advisories/sawmill-… x_refsource_MISC
http://www.osvdb.org/17101 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/15499 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.sawmill.net/version_history7.html x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:06:57.723Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17100",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/17100"
          },
          {
            "name": "1014106",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014106"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
          },
          {
            "name": "17101",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/17101"
          },
          {
            "name": "15499",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15499"
          },
          {
            "name": "sawmill-unknown-gain-access(20879)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sawmill.net/version_history7.html"
          },
          {
            "name": "sawmill-unknown-add-license(20880)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17100",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/17100"
        },
        {
          "name": "1014106",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014106"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
        },
        {
          "name": "17101",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/17101"
        },
        {
          "name": "15499",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15499"
        },
        {
          "name": "sawmill-unknown-gain-access(20879)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sawmill.net/version_history7.html"
        },
        {
          "name": "sawmill-unknown-add-license(20880)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-1900",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17100",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/17100"
            },
            {
              "name": "1014106",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014106"
            },
            {
              "name": "http://www.networksecurity.fi/advisories/sawmill-admin.html",
              "refsource": "MISC",
              "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
            },
            {
              "name": "17101",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/17101"
            },
            {
              "name": "15499",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15499"
            },
            {
              "name": "sawmill-unknown-gain-access(20879)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
            },
            {
              "name": "http://www.sawmill.net/version_history7.html",
              "refsource": "CONFIRM",
              "url": "http://www.sawmill.net/version_history7.html"
            },
            {
              "name": "sawmill-unknown-add-license(20880)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-1900",
    "datePublished": "2005-06-08T04:00:00",
    "dateReserved": "2005-06-08T00:00:00",
    "dateUpdated": "2024-08-07T22:06:57.723Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-1901 (GCVE-0-2005-1901)

Vulnerability from cvelistv5 – Published: 2005-06-08 04:00 – Updated: 2024-08-07 22:06
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.osvdb.org/17102 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/17103 vdb-entryx_refsource_OSVDB
http://securitytracker.com/id?1014106 vdb-entryx_refsource_SECTRACK
http://www.networksecurity.fi/advisories/sawmill-… x_refsource_MISC
http://secunia.com/advisories/15499 third-party-advisoryx_refsource_SECUNIA
http://www.sawmill.net/version_history7.html x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:06:57.810Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17102",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/17102"
          },
          {
            "name": "17103",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/17103"
          },
          {
            "name": "1014106",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014106"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
          },
          {
            "name": "15499",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15499"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sawmill.net/version_history7.html"
          },
          {
            "name": "sawmill-add-user-xss(20881)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17102",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/17102"
        },
        {
          "name": "17103",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/17103"
        },
        {
          "name": "1014106",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014106"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
        },
        {
          "name": "15499",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15499"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sawmill.net/version_history7.html"
        },
        {
          "name": "sawmill-add-user-xss(20881)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-1901",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17102",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/17102"
            },
            {
              "name": "17103",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/17103"
            },
            {
              "name": "1014106",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014106"
            },
            {
              "name": "http://www.networksecurity.fi/advisories/sawmill-admin.html",
              "refsource": "MISC",
              "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
            },
            {
              "name": "15499",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15499"
            },
            {
              "name": "http://www.sawmill.net/version_history7.html",
              "refsource": "CONFIRM",
              "url": "http://www.sawmill.net/version_history7.html"
            },
            {
              "name": "sawmill-add-user-xss(20881)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-1901",
    "datePublished": "2005-06-08T04:00:00",
    "dateReserved": "2005-06-08T00:00:00",
    "dateUpdated": "2024-08-07T22:06:57.810Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-0265 (GCVE-0-2002-0265)

Vulnerability from cvelistv5 – Published: 2002-06-25 04:00 – Updated: 2024-08-08 02:42
VLAI?
Summary
Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:42:28.540Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sawmill.net/version_history.html"
          },
          {
            "name": "4077",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4077"
          },
          {
            "name": "sawmill-admin-password-insecure(8173)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/8173.php"
          },
          {
            "name": "20020211 Vulnerability in Sawmill for  Solaris v. 6.2.14",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-02-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-05-09T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sawmill.net/version_history.html"
        },
        {
          "name": "4077",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4077"
        },
        {
          "name": "sawmill-admin-password-insecure(8173)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/8173.php"
        },
        {
          "name": "20020211 Vulnerability in Sawmill for  Solaris v. 6.2.14",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0265",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.sawmill.net/version_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.sawmill.net/version_history.html"
            },
            {
              "name": "4077",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4077"
            },
            {
              "name": "sawmill-admin-password-insecure(8173)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/8173.php"
            },
            {
              "name": "20020211 Vulnerability in Sawmill for  Solaris v. 6.2.14",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0265",
    "datePublished": "2002-06-25T04:00:00",
    "dateReserved": "2002-05-01T00:00:00",
    "dateUpdated": "2024-08-08T02:42:28.540Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2000-0588 (GCVE-0-2000-0588)

Vulnerability from cvelistv5 – Published: 2000-10-13 04:00 – Updated: 2024-08-08 05:21
VLAI?
Summary
SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:21:31.286Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
          },
          {
            "name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
          },
          {
            "name": "1402",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1402"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-06-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
        },
        {
          "name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
        },
        {
          "name": "1402",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1402"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0588",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
            },
            {
              "name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
            },
            {
              "name": "1402",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1402"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0588",
    "datePublished": "2000-10-13T04:00:00",
    "dateReserved": "2000-07-19T00:00:00",
    "dateUpdated": "2024-08-08T05:21:31.286Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2000-0589 (GCVE-0-2000-0589)

Vulnerability from cvelistv5 – Published: 2000-07-19 04:00 – Updated: 2024-08-08 05:21
VLAI?
Summary
SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:21:31.287Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
          },
          {
            "name": "1403",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1403"
          },
          {
            "name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-06-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2003-03-21T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
        },
        {
          "name": "1403",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1403"
        },
        {
          "name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0589",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
            },
            {
              "name": "1403",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1403"
            },
            {
              "name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0589",
    "datePublished": "2000-07-19T04:00:00",
    "dateReserved": "2000-07-19T00:00:00",
    "dateUpdated": "2024-08-08T05:21:31.287Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-5496 (GCVE-0-2017-5496)

Vulnerability from nvd – Published: 2017-03-15 15:00 – Updated: 2024-08-05 15:04
VLAI?
Summary
Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:04:14.702Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "41395",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/41395/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
          },
          {
            "name": "20170221 Sawmill Enterprise v8.7.9 Pass The Hash Authentication Bypass",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2017/Feb/46"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-02-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-31T09:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "41395",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/41395/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
        },
        {
          "name": "20170221 Sawmill Enterprise v8.7.9 Pass The Hash Authentication Bypass",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2017/Feb/46"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-5496",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "41395",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/41395/"
            },
            {
              "name": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html"
            },
            {
              "name": "20170221 Sawmill Enterprise v8.7.9 Pass The Hash Authentication Bypass",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2017/Feb/46"
            },
            {
              "name": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt",
              "refsource": "MISC",
              "url": "http://hyp3rlinx.altervista.org/advisories/SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-5496",
    "datePublished": "2017-03-15T15:00:00",
    "dateReserved": "2017-01-15T00:00:00",
    "dateUpdated": "2024-08-05T15:04:14.702Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4947 (GCVE-0-2013-4947)

Vulnerability from nvd – Published: 2013-07-29 23:00 – Updated: 2024-08-06 16:59
VLAI?
Summary
Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/54090 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/95059 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/61075 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.sawmill.net/version_history8.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:59:41.078Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "54090",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54090"
          },
          {
            "name": "95059",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/95059"
          },
          {
            "name": "61075",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/61075"
          },
          {
            "name": "sawmill-database-unspecified(85544)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sawmill.net/version_history8.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "54090",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54090"
        },
        {
          "name": "95059",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/95059"
        },
        {
          "name": "61075",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/61075"
        },
        {
          "name": "sawmill-database-unspecified(85544)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sawmill.net/version_history8.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-4947",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "54090",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54090"
            },
            {
              "name": "95059",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/95059"
            },
            {
              "name": "61075",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/61075"
            },
            {
              "name": "sawmill-database-unspecified(85544)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85544"
            },
            {
              "name": "http://www.sawmill.net/version_history8.html",
              "refsource": "CONFIRM",
              "url": "http://www.sawmill.net/version_history8.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-4947",
    "datePublished": "2013-07-29T23:00:00",
    "dateReserved": "2013-07-29T00:00:00",
    "dateUpdated": "2024-08-06T16:59:41.078Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-1079 (GCVE-0-2010-1079)

Vulnerability from nvd – Published: 2010-03-23 19:00 – Updated: 2024-09-16 17:33
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/38730 third-party-advisoryx_refsource_SECUNIA
http://www.sawmill.net/version_history7.html x_refsource_CONFIRM
http://www.securityfocus.com/bid/38387 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:14:05.359Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "38730",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38730"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sawmill.net/version_history7.html"
          },
          {
            "name": "38387",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/38387"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-03-23T19:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "38730",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38730"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sawmill.net/version_history7.html"
        },
        {
          "name": "38387",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/38387"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-1079",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "38730",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38730"
            },
            {
              "name": "http://www.sawmill.net/version_history7.html",
              "refsource": "CONFIRM",
              "url": "http://www.sawmill.net/version_history7.html"
            },
            {
              "name": "38387",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/38387"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-1079",
    "datePublished": "2010-03-23T19:00:00Z",
    "dateReserved": "2010-03-23T00:00:00Z",
    "dateUpdated": "2024-09-16T17:33:26.616Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2950 (GCVE-0-2005-2950)

Vulnerability from nvd – Published: 2005-09-16 04:00 – Updated: 2024-08-07 22:53
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:53:29.927Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sawmill.net/version_history.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
          },
          {
            "name": "16744",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16744/"
          },
          {
            "name": "sawmill-unknown-xss(22206)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
          },
          {
            "name": "20050912 Sawmill XSS vuln",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
          },
          {
            "name": "1",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-09-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sawmill.net/version_history.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
        },
        {
          "name": "16744",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16744/"
        },
        {
          "name": "sawmill-unknown-xss(22206)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
        },
        {
          "name": "20050912 Sawmill XSS vuln",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
        },
        {
          "name": "1",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2950",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.sawmill.net/version_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.sawmill.net/version_history.html"
            },
            {
              "name": "http://www.nta-monitor.com/news/xss/sawmill/index.htm",
              "refsource": "MISC",
              "url": "http://www.nta-monitor.com/news/xss/sawmill/index.htm"
            },
            {
              "name": "16744",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16744/"
            },
            {
              "name": "sawmill-unknown-xss(22206)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22206"
            },
            {
              "name": "20050912 Sawmill XSS vuln",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=112654659400488\u0026w=2"
            },
            {
              "name": "1",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2950",
    "datePublished": "2005-09-16T04:00:00",
    "dateReserved": "2005-09-16T00:00:00",
    "dateUpdated": "2024-08-07T22:53:29.927Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-1900 (GCVE-0-2005-1900)

Vulnerability from nvd – Published: 2005-06-08 04:00 – Updated: 2024-08-07 22:06
VLAI?
Summary
Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.osvdb.org/17100 vdb-entryx_refsource_OSVDB
http://securitytracker.com/id?1014106 vdb-entryx_refsource_SECTRACK
http://www.networksecurity.fi/advisories/sawmill-… x_refsource_MISC
http://www.osvdb.org/17101 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/15499 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.sawmill.net/version_history7.html x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:06:57.723Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17100",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/17100"
          },
          {
            "name": "1014106",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014106"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
          },
          {
            "name": "17101",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/17101"
          },
          {
            "name": "15499",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15499"
          },
          {
            "name": "sawmill-unknown-gain-access(20879)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sawmill.net/version_history7.html"
          },
          {
            "name": "sawmill-unknown-add-license(20880)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17100",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/17100"
        },
        {
          "name": "1014106",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014106"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
        },
        {
          "name": "17101",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/17101"
        },
        {
          "name": "15499",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15499"
        },
        {
          "name": "sawmill-unknown-gain-access(20879)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sawmill.net/version_history7.html"
        },
        {
          "name": "sawmill-unknown-add-license(20880)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-1900",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17100",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/17100"
            },
            {
              "name": "1014106",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014106"
            },
            {
              "name": "http://www.networksecurity.fi/advisories/sawmill-admin.html",
              "refsource": "MISC",
              "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
            },
            {
              "name": "17101",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/17101"
            },
            {
              "name": "15499",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15499"
            },
            {
              "name": "sawmill-unknown-gain-access(20879)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20879"
            },
            {
              "name": "http://www.sawmill.net/version_history7.html",
              "refsource": "CONFIRM",
              "url": "http://www.sawmill.net/version_history7.html"
            },
            {
              "name": "sawmill-unknown-add-license(20880)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20880"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-1900",
    "datePublished": "2005-06-08T04:00:00",
    "dateReserved": "2005-06-08T00:00:00",
    "dateUpdated": "2024-08-07T22:06:57.723Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-1901 (GCVE-0-2005-1901)

Vulnerability from nvd – Published: 2005-06-08 04:00 – Updated: 2024-08-07 22:06
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.osvdb.org/17102 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/17103 vdb-entryx_refsource_OSVDB
http://securitytracker.com/id?1014106 vdb-entryx_refsource_SECTRACK
http://www.networksecurity.fi/advisories/sawmill-… x_refsource_MISC
http://secunia.com/advisories/15499 third-party-advisoryx_refsource_SECUNIA
http://www.sawmill.net/version_history7.html x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:06:57.810Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17102",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/17102"
          },
          {
            "name": "17103",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/17103"
          },
          {
            "name": "1014106",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014106"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
          },
          {
            "name": "15499",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15499"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sawmill.net/version_history7.html"
          },
          {
            "name": "sawmill-add-user-xss(20881)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17102",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/17102"
        },
        {
          "name": "17103",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/17103"
        },
        {
          "name": "1014106",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014106"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
        },
        {
          "name": "15499",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15499"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sawmill.net/version_history7.html"
        },
        {
          "name": "sawmill-add-user-xss(20881)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-1901",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17102",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/17102"
            },
            {
              "name": "17103",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/17103"
            },
            {
              "name": "1014106",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014106"
            },
            {
              "name": "http://www.networksecurity.fi/advisories/sawmill-admin.html",
              "refsource": "MISC",
              "url": "http://www.networksecurity.fi/advisories/sawmill-admin.html"
            },
            {
              "name": "15499",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15499"
            },
            {
              "name": "http://www.sawmill.net/version_history7.html",
              "refsource": "CONFIRM",
              "url": "http://www.sawmill.net/version_history7.html"
            },
            {
              "name": "sawmill-add-user-xss(20881)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20881"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-1901",
    "datePublished": "2005-06-08T04:00:00",
    "dateReserved": "2005-06-08T00:00:00",
    "dateUpdated": "2024-08-07T22:06:57.810Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-0265 (GCVE-0-2002-0265)

Vulnerability from nvd – Published: 2002-06-25 04:00 – Updated: 2024-08-08 02:42
VLAI?
Summary
Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:42:28.540Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sawmill.net/version_history.html"
          },
          {
            "name": "4077",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4077"
          },
          {
            "name": "sawmill-admin-password-insecure(8173)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/8173.php"
          },
          {
            "name": "20020211 Vulnerability in Sawmill for  Solaris v. 6.2.14",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-02-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-05-09T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sawmill.net/version_history.html"
        },
        {
          "name": "4077",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4077"
        },
        {
          "name": "sawmill-admin-password-insecure(8173)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/8173.php"
        },
        {
          "name": "20020211 Vulnerability in Sawmill for  Solaris v. 6.2.14",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0265",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.sawmill.net/version_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.sawmill.net/version_history.html"
            },
            {
              "name": "4077",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4077"
            },
            {
              "name": "sawmill-admin-password-insecure(8173)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/8173.php"
            },
            {
              "name": "20020211 Vulnerability in Sawmill for  Solaris v. 6.2.14",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=101346206921270\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0265",
    "datePublished": "2002-06-25T04:00:00",
    "dateReserved": "2002-05-01T00:00:00",
    "dateUpdated": "2024-08-08T02:42:28.540Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2000-0588 (GCVE-0-2000-0588)

Vulnerability from nvd – Published: 2000-10-13 04:00 – Updated: 2024-08-08 05:21
VLAI?
Summary
SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:21:31.286Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
          },
          {
            "name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
          },
          {
            "name": "1402",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1402"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-06-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
        },
        {
          "name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
        },
        {
          "name": "1402",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1402"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0588",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
            },
            {
              "name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
            },
            {
              "name": "1402",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1402"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0588",
    "datePublished": "2000-10-13T04:00:00",
    "dateReserved": "2000-07-19T00:00:00",
    "dateUpdated": "2024-08-08T05:21:31.286Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2000-0589 (GCVE-0-2000-0589)

Vulnerability from nvd – Published: 2000-07-19 04:00 – Updated: 2024-08-08 05:21
VLAI?
Summary
SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:21:31.287Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
          },
          {
            "name": "1403",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1403"
          },
          {
            "name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-06-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2003-03-21T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
        },
        {
          "name": "1403",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1403"
        },
        {
          "name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0589",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20000706 Patch for Flowerfire Sawmill Vulnerabilities Available",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0080.html"
            },
            {
              "name": "1403",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1403"
            },
            {
              "name": "20000626 sawmill5.0.21 old path bug \u0026 weak hash algorithm",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0271.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0589",
    "datePublished": "2000-07-19T04:00:00",
    "dateReserved": "2000-07-19T00:00:00",
    "dateUpdated": "2024-08-08T05:21:31.287Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}