CVE-2005-2193
Published Jul 11, 2005
Last updated 8 years ago
Overview
- Description
- SQL injection vulnerability in the user profile edit module in profile.php for PunBB 1.2.5 and earlier allows remote attackers to execute arbitrary SQL statements via the temp array, which is not initialized before it is used and prevents the attacker-supplied portions of the array from being properly escaped.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:punbb:punbb:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92F62C7C-EA7A-40B2-A8A0-5FEA69DF321B" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8827471A-6FCC-48A6-BBAA-6DC82EA42EB4" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.0_alpha:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C68B349F-F76D-49D2-95DA-C8670E32530A" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.0_beta1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB336F6C-E81A-43C2-A252-36A192D9CADD" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.0_beta2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91EBBB6B-A4F7-45A3-8BAB-26CEBCD3156E" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.0_beta3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53C4E00F-E370-4DD1-B760-8AA0CEC4E536" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.0_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00082231-3168-4FCC-807B-8AD3DBBFCE92" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.0_rc2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B77FF770-BEB4-4320-AA45-399A5CC6540A" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E04494D1-FE7F-431C-8242-A0591A5D0A6A" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A97DA335-4815-4608-84D5-67F4E539D8F0" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9481F02E-2523-4599-A39D-3ACE518CEC35" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01C976DD-47E4-48CA-AF99-93D0653D31F0" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1AAB3BF-EBFA-4F55-A3D4-0B26F749D91E" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7277A122-5963-4E7F-BA1A-62B19AF804EB" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05BCF8A0-5530-4B36-8CEA-5330307C74CC" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8EDF1AE-B415-4B5B-80CD-0B96AFA21D81" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDBA41AF-C817-476A-8ED1-57808D0B678C" }, { "criteria": "cpe:2.3:a:punbb:punbb:1.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C353C194-328F-4C4C-9773-F06A0FA3978C" } ], "operator": "OR" } ] } ]