CVE-2011-0745
Vulnerability from cvelistv5
Published
2011-03-16 22:00
Modified
2024-08-06 22:05
Severity ?
EPSS score ?
Summary
SugarCRM before 6.1.3 does not properly handle reloads and direct requests for a warning page produced by a certain duplicate check, which allows remote authenticated users to discover (1) the names of customers via a ShowDuplicates action to the Accounts module, reachable through index.php; or (2) the names of contact persons via a ShowDuplicates action to the Contacts module, reachable through index.php.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:05:53.388Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46885", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46885" }, { "name": "sugarcrm-list-info-disclosure(66110)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66110" }, { "name": "ADV-2011-0675", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0675" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.redteam-pentesting.de/advisories/rt-sa-2011-002" }, { "name": "1025222", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025222" }, { "name": "8141", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8141" }, { "name": "20110315 [RT-SA-2011-002] SugarCRM list privilege restriction bypass", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/517027/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "SugarCRM before 6.1.3 does not properly handle reloads and direct requests for a warning page produced by a certain duplicate check, which allows remote authenticated users to discover (1) the names of customers via a ShowDuplicates action to the Accounts module, reachable through index.php; or (2) the names of contact persons via a ShowDuplicates action to the Contacts module, reachable through index.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "46885", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46885" }, { "name": "sugarcrm-list-info-disclosure(66110)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66110" }, { "name": "ADV-2011-0675", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0675" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.redteam-pentesting.de/advisories/rt-sa-2011-002" }, { "name": "1025222", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025222" }, { "name": "8141", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8141" }, { "name": "20110315 [RT-SA-2011-002] SugarCRM list privilege restriction bypass", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/517027/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0745", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SugarCRM before 6.1.3 does not properly handle reloads and direct requests for a warning page produced by a certain duplicate check, which allows remote authenticated users to discover (1) the names of customers via a ShowDuplicates action to the Accounts module, reachable through index.php; or (2) the names of contact persons via a ShowDuplicates action to the Contacts module, reachable through index.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46885", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46885" }, { "name": "sugarcrm-list-info-disclosure(66110)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66110" }, { "name": "ADV-2011-0675", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0675" }, { "name": "http://www.redteam-pentesting.de/advisories/rt-sa-2011-002", "refsource": "MISC", "url": "http://www.redteam-pentesting.de/advisories/rt-sa-2011-002" }, { "name": "1025222", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025222" }, { "name": "8141", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8141" }, { "name": "20110315 [RT-SA-2011-002] SugarCRM list privilege restriction bypass", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/517027/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0745", "datePublished": "2011-03-16T22:00:00", "dateReserved": "2011-02-02T00:00:00", "dateUpdated": "2024-08-06T22:05:53.388Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-0745\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-03-16T22:55:02.980\",\"lastModified\":\"2024-11-21T01:24:45.013\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SugarCRM before 6.1.3 does not properly handle reloads and direct requests for a warning page produced by a certain duplicate check, which allows remote authenticated users to discover (1) the names of customers via a ShowDuplicates action to the Accounts module, reachable through index.php; or (2) the names of contact persons via a ShowDuplicates action to the Contacts module, reachable through index.php.\"},{\"lang\":\"es\",\"value\":\"SugarCRM en versiones anteriores a la 6.1.3 no maneja apropiadamente las recargas y peticiones directas de una p\u00e1gina de advertencia producida por una comprobaci\u00f3n de duplicidad (\\\"check duplicate\\\") determinada, lo que permite a usuarios autenticados remotos averiguar (1) los nombres de clientes a trav\u00e9s una acci\u00f3n ShowDuplicates del m\u00f3dulo Accounts, a la que se puede acceder trav\u00e9s de index.php; o (2) los nombres de personas de contacto a trav\u00e9s de una acci\u00f3n ShowDuplicates del m\u00f3dulo Contacts, a la que se puede acceder trav\u00e9s de index.php.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.1.2\",\"matchCriteriaId\":\"30378EB2-8CB4-402B-86CB-5FE9521F313C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4107E934-D5CF-4ABF-8CB6-0DA90F3D9A74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.0f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85742E7F-C06C-46A5-9008-245BE6E4E0BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.0g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B820A83B-0F03-4523-9D4D-3EB2930B35F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49FA30E3-7572-4BCC-8EFA-9D259DF892E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFBB2BDD-5FA2-40E1-9395-A9DED672E3FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"022D7E5E-BCBC-4E14-9C0D-50E5DD237D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22E73109-5473-417C-A003-7C1EE1DC3ABC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F183CCFF-6D5B-43E7-A70F-E9AEA6E46880\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DA73438-7BA5-4668-90E2-2EECDBBB58A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6C3E6DF-AE5C-4D7F-99B3-16C3967A6A60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.5d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BF53885-8C5B-4654-AB42-587290E58355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A197BD9-85DD-47F2-B30B-6C7F372F6DCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:2.0.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42F2BB29-5136-4F23-8D1B-0507A5FCBF13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:2.0.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"603F5E29-5D0B-4872-A125-D7B1CD77BACA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687D4794-4163-4EC8-9673-47E5EF216371\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12DAF9EB-FED5-482D-820E-553E9057B92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6842129-2DF6-47C9-8960-BF39D1A337C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF5360C-C07C-413A-9B8C-50907187DAC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DED8B842-AAEB-4227-A2D3-64229F4B9FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4525F5B5-E268-4B50-8244-E8829C106FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28098D0F-B3E2-470E-92B1-C9138A664496\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F7EFEF-004A-458A-9B3C-3B1B654C6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACB97DBC-4525-4227-9698-4B05140CCAB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.5.0f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58854312-8672-4399-83FB-DF12DF6052F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13A8BAEB-B6E3-48AF-90E8-28D7146115AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.5.1:*:community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"D0D2A567-7389-4984-BE45-414BB37CCFD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.5.1i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15CE8ADA-3B44-467E-8055-62B92762EAF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.5.1o:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A12D16-AC02-4450-AAFC-192CAA5A2BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91EAD9ED-CB3E-495F-B62C-047604952312\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.0.0:*:community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"6B389680-9097-4034-9590-4F172EFFEF2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.0.0:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"6FEB4B61-0F95-45CA-AB7A-BA07FF2FCA82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.0.0h:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"B23F68DA-DFB0-42E1-959A-F7A68AA83BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.0.0k:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"0C7E5228-8F94-42EA-B0E0-A52E0F05A933\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.1.0:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"6E29C3D7-E58A-4F9D-9C2D-9215EBF9F3BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.1.0-beta:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"FF69D1EA-2B23-4A9A-A535-A4C59C7DBBD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.1c:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"DC04A89E-5379-41B3-BF84-87A2AEB62ED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.1l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9163FEC-6827-429B-A020-6728766C63BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2.0g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"699A9586-0683-4DAA-9E5C-662C0630C6EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"439E75C4-C02D-4905-9D73-CE27D6A54C5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BF95EA0-16E7-4173-AEC8-D66A3F8FB62B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2c:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"F0114CAC-A8F4-489C-818E-DB4E068DAB99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFA524F8-A78F-414A-A5AC-1A89901BD917\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2d:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"25E6CA5B-18F8-4C81-A436-6A7FA0E8B45D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFCC9802-4642-4331-9D56-4E1F76151E24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2e:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"0B6D79D5-2E61-4C1F-906B-EB16F0D97586\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7922DB4E-9812-4636-A61D-8D201CE92D93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57A8ECCF-AAEC-49B1-B474-E4DD14EE7CF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AC18299-07B6-46BB-93DF-E642FE637395\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1E9C26A-6845-45C3-A801-E5F1B5B9B0E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF6C4B76-D1CD-4B58-A9FF-5D35EEAC89EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3943C856-B008-4E66-802B-762D28B679A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61D60F9-F47C-4956-A9DF-594526C55B43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCCDE64A-8C40-4238-B6FA-EA28A39A056A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33762867-534A-4F49-83B5-A80AE73A43E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F806383-1275-4E86-8791-034E146CC02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A03CF9-79B6-4CD2-A3E0-03B7C14DCC27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"850E98DE-3286-4C33-8C79-DE184110078E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07F0B26C-9EF8-4EB0-817C-D17EA0DECF53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"976A3FCD-FFCA-4881-A27D-67557A469EB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F96B0CB-2C92-4785-8BCA-1FC27F05C015\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:6.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16E5EC2-5F12-4295-A1DC-84D483B41B11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD86E19-E2CF-4A06-9A33-DD225A6014F8\"}]}]}],\"references\":[{\"url\":\"http://securityreason.com/securityalert/8141\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redteam-pentesting.de/advisories/rt-sa-2011-002\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/archive/1/517027/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/46885\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1025222\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0675\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66110\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/8141\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redteam-pentesting.de/advisories/rt-sa-2011-002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/archive/1/517027/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/46885\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1025222\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0675\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66110\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.