Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:punbb:punbb:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "05BCF8A0-5530-4B36-8CEA-5330307C74CC", "vulnerable": true}, {"criteria": "cpe:2.3:a:punbb:punbb:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C8EDF1AE-B415-4B5B-80CD-0B96AFA21D81", "vulnerable": true}, {"criteria": "cpe:2.3:a:punbb:punbb:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "DDBA41AF-C817-476A-8ED1-57808D0B678C", "vulnerable": true}, {"criteria": "cpe:2.3:a:punbb:punbb:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "C353C194-328F-4C4C-9773-F06A0FA3978C", "vulnerable": true}, {"criteria": "cpe:2.3:a:punbb:punbb:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BFE58D68-FC34-4F70-849A-2E6CC919230D", "vulnerable": true}, {"criteria": "cpe:2.3:a:punbb:punbb:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "5713E747-5529-4A64-95B4-D9678D8E88B3", "vulnerable": true}, {"criteria": "cpe:2.3:a:punbb:punbb:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "9C920E92-B2AE-416D-9669-9A4FBFE0AE8D", "vulnerable": true}, {"criteria": "cpe:2.3:a:punbb:punbb:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "1DFD4225-32F9-4D62-87C5-9632A1C03326", "vulnerable": true}, {"criteria": "cpe:2.3:a:punbb:punbb:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "4A75787B-6156-4710-9B24-48C5763E7771", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "PunBB 1.2.9, when used alone or with F-ART BLOG:CMS, includes config.php before calling the unregister_globals function, which allows attackers to obtain unspecified sensitive information."}], "id": "CVE-2005-4686", "lastModified": "2024-11-21T00:04:55.817", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2005-12-31T05:00:00.000", "references": [{"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/17425"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/17433"}, {"source": "cve@mitre.org", "url": "http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/15328"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/17425"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/17433"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/15328"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}