Search criteria

9 vulnerabilities found for webgui by plainblack

FKIE_CVE-2015-1564

Vulnerability from fkie_nvd - Published: 2015-02-09 17:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in style-underground/search in Plain Black WebGUI 7.10.29 and earlier allows remote attackers to inject arbitrary web script or HTML via the Search field.
Impacted products
Vendor Product Version
plainblack webgui *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA7E8E5D-8CDC-46DA-B349-53AFC46285A0",
              "versionEndIncluding": "7.10.29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in style-underground/search in Plain Black WebGUI 7.10.29 and earlier allows remote attackers to inject arbitrary web script or HTML via the Search field."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de XSS en style-underground/search en Plain Black WebGUI 7.10.29 y anteriores permite a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML a trav\u00e9s del campo Search."
    }
  ],
  "id": "CVE-2015-1564",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2015-02-09T17:59:00.077",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/fulldisclosure/2015/Jan/79"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://secupent.com/exploit/WebGUI-7.10.29-XSS.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2015/Jan/79"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://secupent.com/exploit/WebGUI-7.10.29-XSS.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-4877

Vulnerability from fkie_nvd - Published: 2010-05-26 18:30 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in WebGUI before 7.7.14 allow remote attackers to hijack the authentication of users for unspecified requests via unknown vectors.
Impacted products
Vendor Product Version
plainblack webgui *
plainblack webgui 7.3.12
plainblack webgui 7.3.13
plainblack webgui 7.3.14
plainblack webgui 7.3.15
plainblack webgui 7.3.16
plainblack webgui 7.3.17
plainblack webgui 7.3.18
plainblack webgui 7.3.19
plainblack webgui 7.3.20
plainblack webgui 7.3.21
plainblack webgui 7.3.22
plainblack webgui 7.4.0
plainblack webgui 7.4.1
plainblack webgui 7.4.2
plainblack webgui 7.4.3
plainblack webgui 7.4.4
plainblack webgui 7.4.5
plainblack webgui 7.4.6
plainblack webgui 7.4.7
plainblack webgui 7.4.8
plainblack webgui 7.4.9
plainblack webgui 7.4.10
plainblack webgui 7.4.11
plainblack webgui 7.4.12
plainblack webgui 7.4.13
plainblack webgui 7.4.14
plainblack webgui 7.4.15
plainblack webgui 7.4.16
plainblack webgui 7.4.17
plainblack webgui 7.4.18
plainblack webgui 7.4.19
plainblack webgui 7.4.20
plainblack webgui 7.4.21
plainblack webgui 7.4.22
plainblack webgui 7.4.23
plainblack webgui 7.4.24
plainblack webgui 7.4.25
plainblack webgui 7.4.26
plainblack webgui 7.4.27
plainblack webgui 7.4.28
plainblack webgui 7.4.29
plainblack webgui 7.4.30
plainblack webgui 7.4.31
plainblack webgui 7.4.32
plainblack webgui 7.4.33
plainblack webgui 7.4.34
plainblack webgui 7.4.35
plainblack webgui 7.4.36
plainblack webgui 7.4.37
plainblack webgui 7.4.38
plainblack webgui 7.4.39
plainblack webgui 7.4.40
plainblack webgui 7.5.0
plainblack webgui 7.5.1
plainblack webgui 7.5.2
plainblack webgui 7.5.3
plainblack webgui 7.5.4
plainblack webgui 7.5.5
plainblack webgui 7.5.6
plainblack webgui 7.5.7
plainblack webgui 7.5.8
plainblack webgui 7.5.9
plainblack webgui 7.5.10
plainblack webgui 7.5.11
plainblack webgui 7.5.13
plainblack webgui 7.5.14
plainblack webgui 7.5.15
plainblack webgui 7.5.16
plainblack webgui 7.5.17
plainblack webgui 7.5.18
plainblack webgui 7.5.19
plainblack webgui 7.5.20
plainblack webgui 7.5.21
plainblack webgui 7.5.22
plainblack webgui 7.5.23
plainblack webgui 7.5.24
plainblack webgui 7.5.25
plainblack webgui 7.5.26
plainblack webgui 7.5.27
plainblack webgui 7.5.28
plainblack webgui 7.5.29
plainblack webgui 7.5.30
plainblack webgui 7.5.31
plainblack webgui 7.5.32
plainblack webgui 7.5.33
plainblack webgui 7.5.34
plainblack webgui 7.5.35
plainblack webgui 7.5.36
plainblack webgui 7.5.37
plainblack webgui 7.5.38
plainblack webgui 7.5.40
plainblack webgui 7.5.40.1
plainblack webgui 7.6.1
plainblack webgui 7.6.2
plainblack webgui 7.6.3
plainblack webgui 7.6.4
plainblack webgui 7.6.5
plainblack webgui 7.6.6
plainblack webgui 7.6.7
plainblack webgui 7.6.8
plainblack webgui 7.6.9
plainblack webgui 7.6.10
plainblack webgui 7.6.11
plainblack webgui 7.6.12
plainblack webgui 7.6.13
plainblack webgui 7.6.14
plainblack webgui 7.6.15
plainblack webgui 7.6.16
plainblack webgui 7.6.17
plainblack webgui 7.6.18
plainblack webgui 7.6.19
plainblack webgui 7.6.20
plainblack webgui 7.6.21
plainblack webgui 7.6.22
plainblack webgui 7.6.23
plainblack webgui 7.6.24
plainblack webgui 7.6.25
plainblack webgui 7.6.26
plainblack webgui 7.6.27
plainblack webgui 7.6.28
plainblack webgui 7.6.29
plainblack webgui 7.6.30
plainblack webgui 7.6.31
plainblack webgui 7.6.32
plainblack webgui 7.6.33
plainblack webgui 7.6.34
plainblack webgui 7.6.35
plainblack webgui 7.6.35.1
plainblack webgui 7.6.35.2
plainblack webgui 7.7.1
plainblack webgui 7.7.2
plainblack webgui 7.7.3
plainblack webgui 7.7.4
plainblack webgui 7.7.5
plainblack webgui 7.7.6
plainblack webgui 7.7.7
plainblack webgui 7.7.8
plainblack webgui 7.7.9
plainblack webgui 7.7.10
plainblack webgui 7.7.11
plainblack webgui 7.7.12

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AFE9036-9FE4-49DE-8B31-CCB993FE7CFD",
              "versionEndIncluding": "7.7.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "49698EF3-7A61-4C22-B299-75273AC05859",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "55A7F328-B9E3-492F-AD84-C051318F4BDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "378BCEBD-4473-4B6C-9117-C4893DFE31E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4766DF1D-6218-4911-B2A9-9D2CF8BD8D54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "713DDC15-3AD7-4489-BFC2-162645E29B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "112BF61D-3594-4BC0-A537-042507C3F43A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.3.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA20293D-EC30-43D0-9268-3CD000961041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.3.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "78A31C05-9845-44C1-B155-D54EC6A8A75E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3D79C8D-3903-45CB-8527-498AAABB9BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B8F62E8-1DD7-4738-AE66-14C92095FA7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.3.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "F62C4FBB-E413-4E57-BB8A-D57CF68011F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ACD1881-67AE-452F-9969-2E6C2A58A7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FE8551F-B210-4D85-8961-4ED89FCAC79C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "86BFFE3D-2567-4C08-ADDE-743479FE1240",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "124126BF-38F6-46C8-B698-718906FE0D40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA181-5330-4BB2-8AFE-E441DF926373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F3203DC-EA59-4E10-A5E2-92756727EEC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9466A378-A98B-440F-97F0-65D38B445822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95F974A-6C7E-4FD2-AC1C-CE0765649335",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2C7FFE3-23D3-43F0-87D4-F3F4CB5C986C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EBE9085-9624-460B-B1CC-53C02C96B0D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DB4F3B-473A-4D2B-B14F-E6C842929FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E14107C6-BD0F-4A46-B0C9-BA9FA74FAA5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CB6B21-6BD7-4427-8771-545B21014982",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "57CF7969-4310-47A3-BAFC-B5B306651DE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "710F848E-7FFE-4CDB-8DC8-A8F11338D0E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AFF297E-9EDC-4E19-A49C-378BF091E81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C6DF50B-3413-4BB9-ABDE-6DB44690CDB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F73FF22-6052-416E-91FD-84CC066393F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9EFD50-FECE-42B6-ACC6-C3AC6FC9546B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DBBDA2A-D3A7-414C-BA70-17190D1BD7DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01EC90B-6087-4F73-BA72-51E0CF114BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9A2D93-8882-474C-AB53-4F799F62F7A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31E4923-5AB0-493C-8664-16FF84C4F601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA40C03-C153-4CCE-B2D6-74749AA49827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "3618B140-CE98-4153-8B05-5C97A8240CF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E6F7BA1-DDF5-4BF6-8EFB-60527A86D862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D85A8FF-2F88-4170-B94B-27E6E75DA20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "04150831-8C9B-4578-883E-53060419BA03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "364B60A3-253E-441A-9444-F3ED0C4B5BF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "329378AE-8AF6-41CB-BCB8-BBCB7C9FA81E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "674207B4-56EF-452F-9E4F-9E5E0032D544",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "65639146-C421-4E56-836E-2CC6DFE75E7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA77FA7E-013F-4CF3-B1D5-FA623CFA2973",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "B66EDFD6-CA3C-444A-A419-F1D5709B3B0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "06A41EEE-D508-4EB3-A51B-9A0B7A26126A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE57129E-11AF-40B9-AC13-13FD86338A08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B565C30-9329-47E9-BA23-EDFEC8DE5210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "28436A12-B810-4C3C-B0D8-18CA7D6C7B63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF100441-A6E4-43BB-A8A9-9A1D08DA973C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "C843FDBF-B131-40BD-9195-364D77750786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.4.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "66395787-8932-4A92-B1A6-4D8B9861AC17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FC5D817-76D8-42BA-8E95-C06C61A090BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "475B4A43-A597-4332-AA16-5E607C36CE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6BF574A-0449-468E-8E8E-3EC11246E748",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E21FF4-413C-4354-9967-0A5AC72AAA91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "54A43421-6CC3-4BAE-B798-EA3F3A4DCFE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CD52360-CB6B-4B3F-B1E9-3084D14A7E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F36C4C-C7C3-47DE-8890-65208359032F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D07BAEE-AD42-4065-B57A-984703AD3B2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "82868B49-FC29-40CD-9AC1-1C4F719E1CA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6CE9E62-E6FD-4777-9811-A35DB12D197A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C037043C-6411-4495-B3C7-3CA8C1B1766D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7B554A1-A76D-43A8-A9F6-74DBD3F67642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E2FD490-33D5-4A1E-B2FD-CFA4042D55E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D35A9AD5-E6FA-4553-B0F0-CA3B27312140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "686020B2-3E91-4EA9-95A2-47A4615E07F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "66C16F3D-E2FF-4FB3-B5D9-CC4F3E3A442A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "953C9F70-7C70-41B2-8719-0BAABD5B31E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "84AF4B33-13B3-48C5-B3C5-2A1D72DA5511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "41B4EAFE-2A0B-40DB-BDC0-85786EACD174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B15D4AD-229F-42AC-9C70-3FB5717FCBD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13850A5-AD21-4EA1-BDA2-A01B3EE2DDBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2077E68F-0CB7-40C3-A993-B525096C3D7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "36A5A260-C20B-4068-95B3-9135532BC8A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "215FE0DA-3A25-4B59-87A0-06D86E2A8CC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35692D6-58F4-400B-9277-2092785D5952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "62B921DB-70F9-4E9E-8CE9-AD03E7C25AF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "279CD1BE-CF6E-4265-8B05-70823BC633AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "B698DE72-84C5-4B4F-8707-937464B25812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "649A9770-B9A7-46F8-9B7B-3142F06631C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B7DBD5-02EF-43FA-9DEB-B2ECBA519884",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DE219AA-A455-416E-8F49-CAB580857D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "91394EC2-03CB-402A-A574-000496E3BE46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04ADD56-382B-4DF6-BC55-4B6D8E2257CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBFA7097-C51D-4C99-98CE-0FAC4A1CF987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "12C3E774-AA29-4331-877C-D015571526D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F76A35F7-E75E-4A19-855F-922C07469A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "84526567-349D-404E-854A-22BB4FE08A30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED39BA01-D5F3-4E70-9E94-6FEC36B747B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F447E8-6DC7-4D99-AB52-FAC1E2300A78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.5.40.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "38E92C8D-9F7B-4AED-B1B3-BA6ED850E8AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B47C210-C74C-43AE-86FB-09C753B05891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C32C07C8-ECD7-4BC8-A839-573E0A9583B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C143941-C5DD-4CAD-AB00-15D47888A90E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D085CA8-B6BA-4B82-85C6-D706208CA6B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBA3484B-1772-4126-843E-F27CDFA93952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D95B35CB-633D-4D9F-A42B-575A1A728653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E51A9A-0BAA-4018-AC9C-715F171507EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4FAD751-BA47-4155-A944-21481D1217B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BCCF3A9-921F-488D-9518-3F3DF0A003C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AAF3927-53EC-4E64-970C-09A87A64DBAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E1188C2-0F55-495D-A94D-EE63C946827A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E43F64A-9CC3-4D94-A2F9-846AC9EE8E40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "288AD698-A51D-4B8B-968F-C3C6DCBB76C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ADD84D9-1E9E-4E22-BE43-D7B1CD3E784B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9014737-00C5-4200-94D6-317A0353ED8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "26DD2BC5-4012-4358-8C9F-7179590A700D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "081B8C08-43E1-42EB-9F09-F9CE46EB72AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4F0E5CC-949A-4A36-A6E1-58749CBE93C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "4168BC83-1D84-4B5D-9BFF-B8F0C3561A3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "29171BC7-539F-4F30-93A3-A1C037A87CDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4024481A-89AB-45F5-AC40-9CF5FEBCA8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "806863B3-118C-4FB7-B51D-901B8A84DBA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C8BC75-27BF-42E9-A503-7860D61A1947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "945876CE-6E8B-4C28-9D10-797A541863E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B18DCC9-8134-4CF2-BA33-DBFB18312495",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "A44CEAD2-D7B4-44B6-88B1-F0565AD94DF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD1C14B-4122-4573-9722-ACC94A60A36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2E5B051-7106-4557-BA00-80F37D722D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB921408-1A24-4269-88A5-55779098B809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "33F8327E-CB91-4E6F-809E-60B1F277731E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE3AB99-7468-4829-83A8-E945A8591C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "E611A6D4-082B-424C-ABCC-2722E0F76E35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E659649-5E36-4EAC-908C-6B4FB888ED44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9999419-6825-4E2E-A526-DF9D539B0D44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "805DE0C1-0896-474A-923C-16249DDC6D92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.35.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "336744FF-6196-4892-B48D-30B9B4F94360",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.6.35.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "348AA661-E281-4C70-ABEF-A746E4FFC90D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD70F61C-A792-4578-9EA4-F781344ACB62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "917DDB2D-5902-45E3-8EF4-F5FF36B03B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A486F5E7-19FF-41D4-AED4-51C02C4BACA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A255A04-0005-47A8-84B6-D98F7C6B9327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E8014D-180A-4C9F-8FD7-01A3631E68CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F906FC2F-2D7E-464C-BD8F-B6103AC9F43C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "47F2C67A-4F52-45EB-85A9-BED54B50F06D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7919323A-024E-4A42-BCC7-2F9A56A7E82D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "261CD1AE-7629-46F0-B05F-2C8E3EA9B3F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2DFCE3F-B119-46ED-9538-365475E0B02B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C24A38D-5A2F-46F6-BCD6-404621E891E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:7.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ED3E9BC-C8F4-463E-AE0A-BD1C6E7B0014",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in WebGUI before 7.7.14 allow remote attackers to hijack the authentication of users for unspecified requests via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en WebGUI anterior v7.7.14 permite a atacantse remotos secuestrar la autenticaci\u00f3n de usuarios para peticiones no especificadas a trav\u00e9s de vectores no especificados. \r\n"
    }
  ],
  "id": "CVE-2009-4877",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-05-26T18:30:01.687",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/55798"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35775"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=695900"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51668"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/55798"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35775"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=695900"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51668"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-2837

Vulnerability from fkie_nvd - Published: 2005-09-07 20:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Multiple eval injection vulnerabilities in PlainBlack Software WebGUI before 6.7.3 allow remote attackers to execute arbitrary Perl code via (1) Help.pm, (2) International.pm, or (3) WebGUI.pm.
Impacted products
Vendor Product Version
plainblack webgui *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:plainblack:webgui:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9EDB4D2-DC25-41D4-813A-DBE685F8D87F",
              "versionEndExcluding": "6.7.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple eval injection vulnerabilities in PlainBlack Software WebGUI before 6.7.3 allow remote attackers to execute arbitrary Perl code via (1) Help.pm, (2) International.pm, or (3) WebGUI.pm."
    }
  ],
  "id": "CVE-2005-2837",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-09-07T20:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.plainblack.com/getwebgui/advisories/security-exploit-found-in-6.x-versions"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/14732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.plainblack.com/getwebgui/advisories/security-exploit-found-in-6.x-versions"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/14732"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2015-1564 (GCVE-0-2015-1564)

Vulnerability from cvelistv5 – Published: 2015-02-09 17:00 – Updated: 2024-09-17 04:14
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in style-underground/search in Plain Black WebGUI 7.10.29 and earlier allows remote attackers to inject arbitrary web script or HTML via the Search field.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:47:16.877Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secupent.com/exploit/WebGUI-7.10.29-XSS.txt"
          },
          {
            "name": "20150120 WebGUI 7.10.29 stable version Cross site scripting vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2015/Jan/79"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in style-underground/search in Plain Black WebGUI 7.10.29 and earlier allows remote attackers to inject arbitrary web script or HTML via the Search field."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-02-09T17:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secupent.com/exploit/WebGUI-7.10.29-XSS.txt"
        },
        {
          "name": "20150120 WebGUI 7.10.29 stable version Cross site scripting vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2015/Jan/79"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-1564",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in style-underground/search in Plain Black WebGUI 7.10.29 and earlier allows remote attackers to inject arbitrary web script or HTML via the Search field."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://secupent.com/exploit/WebGUI-7.10.29-XSS.txt",
              "refsource": "MISC",
              "url": "http://secupent.com/exploit/WebGUI-7.10.29-XSS.txt"
            },
            {
              "name": "20150120 WebGUI 7.10.29 stable version Cross site scripting vulnerability",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2015/Jan/79"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-1564",
    "datePublished": "2015-02-09T17:00:00Z",
    "dateReserved": "2015-02-09T00:00:00Z",
    "dateUpdated": "2024-09-17T04:14:36.162Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4877 (GCVE-0-2009-4877)

Vulnerability from cvelistv5 – Published: 2010-05-26 18:00 – Updated: 2024-08-07 07:17
VLAI?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in WebGUI before 7.7.14 allow remote attackers to hijack the authentication of users for unspecified requests via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://osvdb.org/55798 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/35775 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://sourceforge.net/project/shownotes.php?rele… x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:17:26.157Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "55798",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/55798"
          },
          {
            "name": "35775",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35775"
          },
          {
            "name": "webgui-unspecified-csrf(51668)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51668"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?release_id=695900"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-07-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in WebGUI before 7.7.14 allow remote attackers to hijack the authentication of users for unspecified requests via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "55798",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/55798"
        },
        {
          "name": "35775",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35775"
        },
        {
          "name": "webgui-unspecified-csrf(51668)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51668"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?release_id=695900"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4877",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in WebGUI before 7.7.14 allow remote attackers to hijack the authentication of users for unspecified requests via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "55798",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/55798"
            },
            {
              "name": "35775",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35775"
            },
            {
              "name": "webgui-unspecified-csrf(51668)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51668"
            },
            {
              "name": "http://sourceforge.net/project/shownotes.php?release_id=695900",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/project/shownotes.php?release_id=695900"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4877",
    "datePublished": "2010-05-26T18:00:00",
    "dateReserved": "2010-05-26T00:00:00",
    "dateUpdated": "2024-08-07T07:17:26.157Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2837 (GCVE-0-2005-2837)

Vulnerability from cvelistv5 – Published: 2005-09-07 04:00 – Updated: 2024-09-16 23:05
VLAI?
Summary
Multiple eval injection vulnerabilities in PlainBlack Software WebGUI before 6.7.3 allow remote attackers to execute arbitrary Perl code via (1) Help.pm, (2) International.pm, or (3) WebGUI.pm.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:45:02.335Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.plainblack.com/getwebgui/advisories/security-exploit-found-in-6.x-versions"
          },
          {
            "name": "14732",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14732"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple eval injection vulnerabilities in PlainBlack Software WebGUI before 6.7.3 allow remote attackers to execute arbitrary Perl code via (1) Help.pm, (2) International.pm, or (3) WebGUI.pm."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-09-07T04:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.plainblack.com/getwebgui/advisories/security-exploit-found-in-6.x-versions"
        },
        {
          "name": "14732",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14732"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2837",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple eval injection vulnerabilities in PlainBlack Software WebGUI before 6.7.3 allow remote attackers to execute arbitrary Perl code via (1) Help.pm, (2) International.pm, or (3) WebGUI.pm."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.plainblack.com/getwebgui/advisories/security-exploit-found-in-6.x-versions",
              "refsource": "CONFIRM",
              "url": "http://www.plainblack.com/getwebgui/advisories/security-exploit-found-in-6.x-versions"
            },
            {
              "name": "14732",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14732"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2837",
    "datePublished": "2005-09-07T04:00:00Z",
    "dateReserved": "2005-09-07T00:00:00Z",
    "dateUpdated": "2024-09-16T23:05:37.149Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-1564 (GCVE-0-2015-1564)

Vulnerability from nvd – Published: 2015-02-09 17:00 – Updated: 2024-09-17 04:14
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in style-underground/search in Plain Black WebGUI 7.10.29 and earlier allows remote attackers to inject arbitrary web script or HTML via the Search field.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:47:16.877Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secupent.com/exploit/WebGUI-7.10.29-XSS.txt"
          },
          {
            "name": "20150120 WebGUI 7.10.29 stable version Cross site scripting vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2015/Jan/79"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in style-underground/search in Plain Black WebGUI 7.10.29 and earlier allows remote attackers to inject arbitrary web script or HTML via the Search field."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-02-09T17:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secupent.com/exploit/WebGUI-7.10.29-XSS.txt"
        },
        {
          "name": "20150120 WebGUI 7.10.29 stable version Cross site scripting vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2015/Jan/79"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-1564",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in style-underground/search in Plain Black WebGUI 7.10.29 and earlier allows remote attackers to inject arbitrary web script or HTML via the Search field."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://secupent.com/exploit/WebGUI-7.10.29-XSS.txt",
              "refsource": "MISC",
              "url": "http://secupent.com/exploit/WebGUI-7.10.29-XSS.txt"
            },
            {
              "name": "20150120 WebGUI 7.10.29 stable version Cross site scripting vulnerability",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2015/Jan/79"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-1564",
    "datePublished": "2015-02-09T17:00:00Z",
    "dateReserved": "2015-02-09T00:00:00Z",
    "dateUpdated": "2024-09-17T04:14:36.162Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4877 (GCVE-0-2009-4877)

Vulnerability from nvd – Published: 2010-05-26 18:00 – Updated: 2024-08-07 07:17
VLAI?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in WebGUI before 7.7.14 allow remote attackers to hijack the authentication of users for unspecified requests via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://osvdb.org/55798 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/35775 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://sourceforge.net/project/shownotes.php?rele… x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:17:26.157Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "55798",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/55798"
          },
          {
            "name": "35775",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35775"
          },
          {
            "name": "webgui-unspecified-csrf(51668)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51668"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?release_id=695900"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-07-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in WebGUI before 7.7.14 allow remote attackers to hijack the authentication of users for unspecified requests via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "55798",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/55798"
        },
        {
          "name": "35775",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35775"
        },
        {
          "name": "webgui-unspecified-csrf(51668)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51668"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?release_id=695900"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4877",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in WebGUI before 7.7.14 allow remote attackers to hijack the authentication of users for unspecified requests via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "55798",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/55798"
            },
            {
              "name": "35775",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35775"
            },
            {
              "name": "webgui-unspecified-csrf(51668)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51668"
            },
            {
              "name": "http://sourceforge.net/project/shownotes.php?release_id=695900",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/project/shownotes.php?release_id=695900"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4877",
    "datePublished": "2010-05-26T18:00:00",
    "dateReserved": "2010-05-26T00:00:00",
    "dateUpdated": "2024-08-07T07:17:26.157Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2837 (GCVE-0-2005-2837)

Vulnerability from nvd – Published: 2005-09-07 04:00 – Updated: 2024-09-16 23:05
VLAI?
Summary
Multiple eval injection vulnerabilities in PlainBlack Software WebGUI before 6.7.3 allow remote attackers to execute arbitrary Perl code via (1) Help.pm, (2) International.pm, or (3) WebGUI.pm.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:45:02.335Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.plainblack.com/getwebgui/advisories/security-exploit-found-in-6.x-versions"
          },
          {
            "name": "14732",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14732"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple eval injection vulnerabilities in PlainBlack Software WebGUI before 6.7.3 allow remote attackers to execute arbitrary Perl code via (1) Help.pm, (2) International.pm, or (3) WebGUI.pm."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-09-07T04:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.plainblack.com/getwebgui/advisories/security-exploit-found-in-6.x-versions"
        },
        {
          "name": "14732",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14732"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2837",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple eval injection vulnerabilities in PlainBlack Software WebGUI before 6.7.3 allow remote attackers to execute arbitrary Perl code via (1) Help.pm, (2) International.pm, or (3) WebGUI.pm."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.plainblack.com/getwebgui/advisories/security-exploit-found-in-6.x-versions",
              "refsource": "CONFIRM",
              "url": "http://www.plainblack.com/getwebgui/advisories/security-exploit-found-in-6.x-versions"
            },
            {
              "name": "14732",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14732"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2837",
    "datePublished": "2005-09-07T04:00:00Z",
    "dateReserved": "2005-09-07T00:00:00Z",
    "dateUpdated": "2024-09-16T23:05:37.149Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}