cve-2011-0745
Vulnerability from cvelistv5
Published
2011-03-16 22:00
Modified
2024-08-06 22:05
Severity ?
Summary
SugarCRM before 6.1.3 does not properly handle reloads and direct requests for a warning page produced by a certain duplicate check, which allows remote authenticated users to discover (1) the names of customers via a ShowDuplicates action to the Accounts module, reachable through index.php; or (2) the names of contact persons via a ShowDuplicates action to the Contacts module, reachable through index.php.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:05:53.388Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "46885",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46885"
          },
          {
            "name": "sugarcrm-list-info-disclosure(66110)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66110"
          },
          {
            "name": "ADV-2011-0675",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0675"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.redteam-pentesting.de/advisories/rt-sa-2011-002"
          },
          {
            "name": "1025222",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025222"
          },
          {
            "name": "8141",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8141"
          },
          {
            "name": "20110315 [RT-SA-2011-002] SugarCRM list privilege restriction bypass",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/517027/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SugarCRM before 6.1.3 does not properly handle reloads and direct requests for a warning page produced by a certain duplicate check, which allows remote authenticated users to discover (1) the names of customers via a ShowDuplicates action to the Accounts module, reachable through index.php; or (2) the names of contact persons via a ShowDuplicates action to the Contacts module, reachable through index.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "46885",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46885"
        },
        {
          "name": "sugarcrm-list-info-disclosure(66110)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66110"
        },
        {
          "name": "ADV-2011-0675",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0675"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.redteam-pentesting.de/advisories/rt-sa-2011-002"
        },
        {
          "name": "1025222",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025222"
        },
        {
          "name": "8141",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8141"
        },
        {
          "name": "20110315 [RT-SA-2011-002] SugarCRM list privilege restriction bypass",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/517027/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-0745",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SugarCRM before 6.1.3 does not properly handle reloads and direct requests for a warning page produced by a certain duplicate check, which allows remote authenticated users to discover (1) the names of customers via a ShowDuplicates action to the Accounts module, reachable through index.php; or (2) the names of contact persons via a ShowDuplicates action to the Contacts module, reachable through index.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "46885",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46885"
            },
            {
              "name": "sugarcrm-list-info-disclosure(66110)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66110"
            },
            {
              "name": "ADV-2011-0675",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0675"
            },
            {
              "name": "http://www.redteam-pentesting.de/advisories/rt-sa-2011-002",
              "refsource": "MISC",
              "url": "http://www.redteam-pentesting.de/advisories/rt-sa-2011-002"
            },
            {
              "name": "1025222",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025222"
            },
            {
              "name": "8141",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/8141"
            },
            {
              "name": "20110315 [RT-SA-2011-002] SugarCRM list privilege restriction bypass",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/517027/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-0745",
    "datePublished": "2011-03-16T22:00:00",
    "dateReserved": "2011-02-02T00:00:00",
    "dateUpdated": "2024-08-06T22:05:53.388Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-0745\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-03-16T22:55:02.980\",\"lastModified\":\"2024-11-21T01:24:45.013\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SugarCRM before 6.1.3 does not properly handle reloads and direct requests for a warning page produced by a certain duplicate check, which allows remote authenticated users to discover (1) the names of customers via a ShowDuplicates action to the Accounts module, reachable through index.php; or (2) the names of contact persons via a ShowDuplicates action to the Contacts module, reachable through index.php.\"},{\"lang\":\"es\",\"value\":\"SugarCRM en versiones anteriores a la 6.1.3 no maneja apropiadamente las recargas y peticiones directas de una p\u00e1gina de advertencia producida por una comprobaci\u00f3n de duplicidad (\\\"check duplicate\\\") determinada, lo que permite a usuarios autenticados remotos averiguar (1) los nombres de clientes a trav\u00e9s una acci\u00f3n ShowDuplicates del m\u00f3dulo Accounts, a la que se puede acceder trav\u00e9s de index.php; o (2) los nombres de personas de contacto a trav\u00e9s de una acci\u00f3n ShowDuplicates del m\u00f3dulo Contacts, a la que se puede acceder trav\u00e9s de index.php.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.1.2\",\"matchCriteriaId\":\"30378EB2-8CB4-402B-86CB-5FE9521F313C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4107E934-D5CF-4ABF-8CB6-0DA90F3D9A74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.0f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85742E7F-C06C-46A5-9008-245BE6E4E0BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.0g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B820A83B-0F03-4523-9D4D-3EB2930B35F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49FA30E3-7572-4BCC-8EFA-9D259DF892E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFBB2BDD-5FA2-40E1-9395-A9DED672E3FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"022D7E5E-BCBC-4E14-9C0D-50E5DD237D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22E73109-5473-417C-A003-7C1EE1DC3ABC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F183CCFF-6D5B-43E7-A70F-E9AEA6E46880\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DA73438-7BA5-4668-90E2-2EECDBBB58A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6C3E6DF-AE5C-4D7F-99B3-16C3967A6A60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:1.5d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BF53885-8C5B-4654-AB42-587290E58355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A197BD9-85DD-47F2-B30B-6C7F372F6DCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:2.0.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42F2BB29-5136-4F23-8D1B-0507A5FCBF13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:2.0.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"603F5E29-5D0B-4872-A125-D7B1CD77BACA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687D4794-4163-4EC8-9673-47E5EF216371\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12DAF9EB-FED5-482D-820E-553E9057B92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6842129-2DF6-47C9-8960-BF39D1A337C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF5360C-C07C-413A-9B8C-50907187DAC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DED8B842-AAEB-4227-A2D3-64229F4B9FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4525F5B5-E268-4B50-8244-E8829C106FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28098D0F-B3E2-470E-92B1-C9138A664496\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F7EFEF-004A-458A-9B3C-3B1B654C6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACB97DBC-4525-4227-9698-4B05140CCAB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.5.0f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58854312-8672-4399-83FB-DF12DF6052F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13A8BAEB-B6E3-48AF-90E8-28D7146115AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.5.1:*:community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"D0D2A567-7389-4984-BE45-414BB37CCFD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.5.1i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15CE8ADA-3B44-467E-8055-62B92762EAF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:4.5.1o:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A12D16-AC02-4450-AAFC-192CAA5A2BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91EAD9ED-CB3E-495F-B62C-047604952312\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.0.0:*:community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"6B389680-9097-4034-9590-4F172EFFEF2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.0.0:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"6FEB4B61-0F95-45CA-AB7A-BA07FF2FCA82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.0.0h:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"B23F68DA-DFB0-42E1-959A-F7A68AA83BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.0.0k:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"0C7E5228-8F94-42EA-B0E0-A52E0F05A933\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.1.0:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"6E29C3D7-E58A-4F9D-9C2D-9215EBF9F3BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.1.0-beta:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"FF69D1EA-2B23-4A9A-A535-A4C59C7DBBD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.1c:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"DC04A89E-5379-41B3-BF84-87A2AEB62ED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.1l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9163FEC-6827-429B-A020-6728766C63BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2.0g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"699A9586-0683-4DAA-9E5C-662C0630C6EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"439E75C4-C02D-4905-9D73-CE27D6A54C5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BF95EA0-16E7-4173-AEC8-D66A3F8FB62B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2c:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"F0114CAC-A8F4-489C-818E-DB4E068DAB99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFA524F8-A78F-414A-A5AC-1A89901BD917\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2d:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"25E6CA5B-18F8-4C81-A436-6A7FA0E8B45D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFCC9802-4642-4331-9D56-4E1F76151E24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2e:*:sugar_community_edition:*:*:*:*:*\",\"matchCriteriaId\":\"0B6D79D5-2E61-4C1F-906B-EB16F0D97586\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7922DB4E-9812-4636-A61D-8D201CE92D93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57A8ECCF-AAEC-49B1-B474-E4DD14EE7CF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.2h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AC18299-07B6-46BB-93DF-E642FE637395\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1E9C26A-6845-45C3-A801-E5F1B5B9B0E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF6C4B76-D1CD-4B58-A9FF-5D35EEAC89EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3943C856-B008-4E66-802B-762D28B679A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61D60F9-F47C-4956-A9DF-594526C55B43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCCDE64A-8C40-4238-B6FA-EA28A39A056A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33762867-534A-4F49-83B5-A80AE73A43E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F806383-1275-4E86-8791-034E146CC02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:5.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A03CF9-79B6-4CD2-A3E0-03B7C14DCC27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"850E98DE-3286-4C33-8C79-DE184110078E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07F0B26C-9EF8-4EB0-817C-D17EA0DECF53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"976A3FCD-FFCA-4881-A27D-67557A469EB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F96B0CB-2C92-4785-8BCA-1FC27F05C015\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:6.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16E5EC2-5F12-4295-A1DC-84D483B41B11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sugarcrm:sugarcrm:6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD86E19-E2CF-4A06-9A33-DD225A6014F8\"}]}]}],\"references\":[{\"url\":\"http://securityreason.com/securityalert/8141\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redteam-pentesting.de/advisories/rt-sa-2011-002\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/archive/1/517027/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/46885\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1025222\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0675\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66110\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/8141\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redteam-pentesting.de/advisories/rt-sa-2011-002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/archive/1/517027/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/46885\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1025222\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0675\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66110\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.