Show plain JSON{"id": "CVE-2004-2506", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2004-12-31T05:00:00.000", "references": [{"url": "http://secunia.com/advisories/11394", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://sourceforge.net/project/shownotes.php?release_id=231421", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/5401", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15885", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/11394", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://sourceforge.net/project/shownotes.php?release_id=231421", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/5401", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15885", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Unparsed web content delivery vulnerability in WIKINDX before 0.9.9g allows remote attackers to obtain sensitive information via a direct HTTP request to the config.inc file."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:wikindx:wikindx:0.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A89DC407-27EA-49B0-98A4-4399044228D7"}, {"criteria": "cpe:2.3:a:wikindx:wikindx:0.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9838DBB-56D6-4529-9EC7-2715FA774290"}, {"criteria": "cpe:2.3:a:wikindx:wikindx:0.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "353790C3-B87D-45BD-9F5B-2602E0FD7E4E"}, {"criteria": "cpe:2.3:a:wikindx:wikindx:0.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF1EC898-CE10-4E5B-8601-8C37E3C94EDF"}, {"criteria": "cpe:2.3:a:wikindx:wikindx:0.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51EB7436-9A62-47F0-B958-1FA3D88F114C"}, {"criteria": "cpe:2.3:a:wikindx:wikindx:0.9.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4A00DF0-4504-4993-BBB7-061B3124BD36"}, {"criteria": "cpe:2.3:a:wikindx:wikindx:0.9.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2930B102-15D1-403D-B3FC-A94915E10EC4"}, {"criteria": "cpe:2.3:a:wikindx:wikindx:0.9.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96FE1F6D-4621-4336-934B-F29531FB539A"}, {"criteria": "cpe:2.3:a:wikindx:wikindx:0.9.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B67AF0BD-D3E4-4D7E-88FC-FD85A4B4B32A"}, {"criteria": "cpe:2.3:a:wikindx:wikindx:0.9.9b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10B8719C-62D6-4A03-9580-DCCFBE5D6F24"}, {"criteria": "cpe:2.3:a:wikindx:wikindx:0.9.9c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D1317BC-E44F-4137-B982-FA280EAC7552"}, {"criteria": "cpe:2.3:a:wikindx:wikindx:0.9.9d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "787ECB90-ABBC-4FF1-A801-831AE7159442"}, {"criteria": "cpe:2.3:a:wikindx:wikindx:0.9.9e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA4DAC99-37E7-42AB-86B0-71645731179C"}, {"criteria": "cpe:2.3:a:wikindx:wikindx:0.9.9f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "560B0534-5BEC-49A5-8E3E-F9874A6DF416"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}