Vulnerabilites related to mads_brunn - t3quixplorer
cve-2010-1021
Vulnerability from cvelistv5
Published
2010-03-19 18:35
Modified
2024-09-16 19:09
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Typo3 Quixplorer (t3quixplorer) extension before 1.7.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T01:06:52.662Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/",
               },
               {
                  name: "38993",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/38993",
               },
               {
                  name: "38818",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/38818",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/",
               },
               {
                  name: "63036",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/63036",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Cross-site scripting (XSS) vulnerability in the Typo3 Quixplorer (t3quixplorer) extension before 1.7.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2010-03-19T18:35:00Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/",
            },
            {
               name: "38993",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/38993",
            },
            {
               name: "38818",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/38818",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/",
            },
            {
               name: "63036",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/63036",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2010-1021",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cross-site scripting (XSS) vulnerability in the Typo3 Quixplorer (t3quixplorer) extension before 1.7.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/",
                     refsource: "CONFIRM",
                     url: "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/",
                  },
                  {
                     name: "38993",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/38993",
                  },
                  {
                     name: "38818",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/38818",
                  },
                  {
                     name: "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/",
                     refsource: "CONFIRM",
                     url: "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/",
                  },
                  {
                     name: "63036",
                     refsource: "OSVDB",
                     url: "http://osvdb.org/63036",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2010-1021",
      datePublished: "2010-03-19T18:35:00Z",
      dateReserved: "2010-03-19T00:00:00Z",
      dateUpdated: "2024-09-16T19:09:23.261Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2011-5005
Vulnerability from cvelistv5
Published
2011-12-25 01:00
Modified
2024-08-07 00:23
Severity ?
Summary
Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory.
References
http://www.exploit-db.com/exploits/18118exploit, x_refsource_EXPLOIT-DB
https://exchange.xforce.ibmcloud.com/vulnerabilities/71323vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T00:23:39.630Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "18118",
                  tags: [
                     "exploit",
                     "x_refsource_EXPLOIT-DB",
                     "x_transferred",
                  ],
                  url: "http://www.exploit-db.com/exploits/18118",
               },
               {
                  name: "quixplorer-index-file-upload(71323)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2011-11-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-28T12:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "18118",
               tags: [
                  "exploit",
                  "x_refsource_EXPLOIT-DB",
               ],
               url: "http://www.exploit-db.com/exploits/18118",
            },
            {
               name: "quixplorer-index-file-upload(71323)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2011-5005",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "18118",
                     refsource: "EXPLOIT-DB",
                     url: "http://www.exploit-db.com/exploits/18118",
                  },
                  {
                     name: "quixplorer-index-file-upload(71323)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2011-5005",
      datePublished: "2011-12-25T01:00:00",
      dateReserved: "2011-12-24T00:00:00",
      dateUpdated: "2024-08-07T00:23:39.630Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2010-03-19 19:00
Modified
2024-11-21 01:13
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Typo3 Quixplorer (t3quixplorer) extension before 1.7.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A39EDD2-DA0D-4208-A969-44E76D7F1494",
                     versionEndIncluding: "1.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "BE727C14-8517-4996-8D34-FAF238CB3429",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "03A9826B-068A-4923-B3C7-02EA3C732038",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C03C88C-5D51-4720-90C8-EDFF288702AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8B77C9D-C67F-4D46-928F-50811DEF43F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA0BD9C3-199A-4C23-B9E2-FC30C8461B0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D26478C-CF65-43D7-81F9-A2EB14F94689",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3B9A49E-17E4-4118-8AB4-B42259123E4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A423F65-9148-4393-BB29-0BCB72557C83",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F1C59B0-CDF2-4F9A-88C7-61E8F18590DB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cross-site scripting (XSS) vulnerability in the Typo3 Quixplorer (t3quixplorer) extension before 1.7.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en la extensión Typo3 Quixplorer (t3quixplorer) anteriores a v1.7.1 para TYPO3 permite a atacantes remotos inyectar código web o HTML de su elección a través de vectores sin especificar.",
      },
   ],
   id: "CVE-2010-1021",
   lastModified: "2024-11-21T01:13:26.893",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2010-03-19T19:00:00.937",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://osvdb.org/63036",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/38993",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/38818",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://osvdb.org/63036",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/38993",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/38818",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-12-25 01:55
Modified
2024-11-21 01:33
Severity ?
Summary
Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:claudio_klingler:quixplorer:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "13FBDE35-7E96-4CB0-AA02-20A54E25C034",
                     versionEndIncluding: "2.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:claudio_klingler:quixplorer:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "354BBE12-96AA-4F3C-8B51-CFE80E4808D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:claudio_klingler:quixplorer:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FCFC487-FDA2-4D26-8140-1F16BAA7A658",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:claudio_klingler:quixplorer:1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B19E0034-0B67-4A71-83E8-98A148FF89F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:claudio_klingler:quixplorer:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F06FAD64-5233-44BB-9FDA-ED019967B7D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:claudio_klingler:quixplorer:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9541428-5609-43FE-BF9B-49414E64D0B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:claudio_klingler:quixplorer:1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AE410E3-E0AB-4C47-AB4A-7290460BB9BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:claudio_klingler:quixplorer:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF42BE37-1569-4D22-9302-B1F5AB12C0B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:claudio_klingler:quixplorer:2.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFF152CB-58C1-4B9A-87E0-16A7E9EFF7EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:claudio_klingler:quixplorer:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "83892CE6-D168-4B03-94C8-CE167326FA60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "BE727C14-8517-4996-8D34-FAF238CB3429",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "03A9826B-068A-4923-B3C7-02EA3C732038",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C03C88C-5D51-4720-90C8-EDFF288702AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8B77C9D-C67F-4D46-928F-50811DEF43F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA0BD9C3-199A-4C23-B9E2-FC30C8461B0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D26478C-CF65-43D7-81F9-A2EB14F94689",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3B9A49E-17E4-4118-8AB4-B42259123E4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A423F65-9148-4393-BB29-0BCB72557C83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "13CB2420-FEDA-41E7-B650-84C71BFC0EAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mads_brunn:t3quixplorer:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8995BEFE-4E47-47ED-88DA-3BA06D4B2392",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de subida no restringida de ficheros en QuiXplorer v2.3 y anteriores permite a atacantes remotos ejecutar código de su elección al subir un fichero con una extensión ejecutable usando la opción de subir en index.php, accediendo posteriormente mediante una petición directa del fichero en un directorio no especificado",
      },
   ],
   id: "CVE-2011-5005",
   lastModified: "2024-11-21T01:33:24.773",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-12-25T01:55:04.523",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.exploit-db.com/exploits/18118",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.exploit-db.com/exploits/18118",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}