Search criteria
2 vulnerabilities found for discuz\! by discuz
CVE-2008-6957 (GCVE-0-2008-6957)
Vulnerability from nvd – Published: 2009-08-12 10:00 – Updated: 2024-08-07 11:49
VLAI?
Summary
member.php in Crossday Discuz! Board allows remote attackers to reset passwords of arbitrary users via crafted (1) lostpasswd and (2) getpasswd actions, possibly involving predictable generation of the id parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T11:49:02.487Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "7185",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/7185"
},
{
"name": "32731",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32731"
},
{
"name": "discuz-member-security-bypass(46785)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46785"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.discuz.net/archiver/?tid-1112426.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.80vul.com/dzvul/sodb/14/dz-exp-sodb-2008-14_php.htm"
},
{
"name": "32424",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/32424"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-11-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "member.php in Crossday Discuz! Board allows remote attackers to reset passwords of arbitrary users via crafted (1) lostpasswd and (2) getpasswd actions, possibly involving predictable generation of the id parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "7185",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/7185"
},
{
"name": "32731",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32731"
},
{
"name": "discuz-member-security-bypass(46785)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46785"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.discuz.net/archiver/?tid-1112426.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.80vul.com/dzvul/sodb/14/dz-exp-sodb-2008-14_php.htm"
},
{
"name": "32424",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/32424"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-6957",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "member.php in Crossday Discuz! Board allows remote attackers to reset passwords of arbitrary users via crafted (1) lostpasswd and (2) getpasswd actions, possibly involving predictable generation of the id parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "7185",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7185"
},
{
"name": "32731",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32731"
},
{
"name": "discuz-member-security-bypass(46785)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46785"
},
{
"name": "http://www.discuz.net/archiver/?tid-1112426.html",
"refsource": "MISC",
"url": "http://www.discuz.net/archiver/?tid-1112426.html"
},
{
"name": "http://www.80vul.com/dzvul/sodb/14/dz-exp-sodb-2008-14_php.htm",
"refsource": "MISC",
"url": "http://www.80vul.com/dzvul/sodb/14/dz-exp-sodb-2008-14_php.htm"
},
{
"name": "32424",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32424"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-6957",
"datePublished": "2009-08-12T10:00:00",
"dateReserved": "2009-08-11T00:00:00",
"dateUpdated": "2024-08-07T11:49:02.487Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-6957 (GCVE-0-2008-6957)
Vulnerability from cvelistv5 – Published: 2009-08-12 10:00 – Updated: 2024-08-07 11:49
VLAI?
Summary
member.php in Crossday Discuz! Board allows remote attackers to reset passwords of arbitrary users via crafted (1) lostpasswd and (2) getpasswd actions, possibly involving predictable generation of the id parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T11:49:02.487Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "7185",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/7185"
},
{
"name": "32731",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32731"
},
{
"name": "discuz-member-security-bypass(46785)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46785"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.discuz.net/archiver/?tid-1112426.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.80vul.com/dzvul/sodb/14/dz-exp-sodb-2008-14_php.htm"
},
{
"name": "32424",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/32424"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-11-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "member.php in Crossday Discuz! Board allows remote attackers to reset passwords of arbitrary users via crafted (1) lostpasswd and (2) getpasswd actions, possibly involving predictable generation of the id parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "7185",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/7185"
},
{
"name": "32731",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32731"
},
{
"name": "discuz-member-security-bypass(46785)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46785"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.discuz.net/archiver/?tid-1112426.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.80vul.com/dzvul/sodb/14/dz-exp-sodb-2008-14_php.htm"
},
{
"name": "32424",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/32424"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-6957",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "member.php in Crossday Discuz! Board allows remote attackers to reset passwords of arbitrary users via crafted (1) lostpasswd and (2) getpasswd actions, possibly involving predictable generation of the id parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "7185",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7185"
},
{
"name": "32731",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32731"
},
{
"name": "discuz-member-security-bypass(46785)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46785"
},
{
"name": "http://www.discuz.net/archiver/?tid-1112426.html",
"refsource": "MISC",
"url": "http://www.discuz.net/archiver/?tid-1112426.html"
},
{
"name": "http://www.80vul.com/dzvul/sodb/14/dz-exp-sodb-2008-14_php.htm",
"refsource": "MISC",
"url": "http://www.80vul.com/dzvul/sodb/14/dz-exp-sodb-2008-14_php.htm"
},
{
"name": "32424",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32424"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-6957",
"datePublished": "2009-08-12T10:00:00",
"dateReserved": "2009-08-11T00:00:00",
"dateUpdated": "2024-08-07T11:49:02.487Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}