Show plain JSON{"id": "CVE-2003-1162", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2003-12-31T05:00:00.000", "references": [{"url": "http://archives.neohapsis.com/archives/bugtraq/2003-10/0348.html", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/10135", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/2770", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/8944", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13587", "source": "cve@mitre.org"}, {"url": "http://archives.neohapsis.com/archives/bugtraq/2003-10/0348.html", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/10135", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/2770", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/8944", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13587", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "index.php in Tritanium Bulletin Board 1.2.3 allows remote attackers to read and reply to arbitrary messages by modifying the thread_id, forum_id, and sid parameters."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:0.993_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "560C0639-351B-40A3-B613-A4043293511E"}, {"criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:0.994_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64AD01A0-4A2C-4AA6-B090-9BAEC28ABE83"}, {"criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:0.999_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "257C937F-FB66-42DB-987C-D23CCA1ED0B7"}, {"criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:1.0_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E67CC50-C1E2-4CFD-839C-90DF2EF353FB"}, {"criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:1.1_final:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EBF4D35-0228-487A-8D6B-78C126E24631"}, {"criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "819B8784-71B7-45FF-9EF9-FA69000CA050"}, {"criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "793AC3B6-E723-4F72-BF9C-EFDB79300D26"}, {"criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D086966B-60A3-49BE-A16E-FE5B93FFFFF8"}, {"criteria": "cpe:2.3:a:tritanium_scripts:tritanium_bulletin_board:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBCE8AE0-2C1D-4151-8377-1CECCF642FB3"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}