Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ajaxplorer:ajaxplorer:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "3AB14FF4-0CF0-4ACF-BA85-59196A259BAA", "vulnerable": true}, {"criteria": "cpe:2.3:a:ajaxplorer:ajaxplorer:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA399184-3366-48E8-90F8-0BDF255DB2CA", "vulnerable": true}, {"criteria": "cpe:2.3:a:ajaxplorer:ajaxplorer:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD6997D4-21C7-459F-8CB1-31E98C44BC91", "vulnerable": true}, {"criteria": "cpe:2.3:a:ajaxplorer:ajaxplorer:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "08354E81-1FF5-4CEF-8B5B-A3B3C514F03B", "vulnerable": true}, {"criteria": "cpe:2.3:a:ajaxplorer:ajaxplorer:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC4FFE75-9BBE-4C9F-A7E5-350AC7701ECD", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ajaxplorer:ajaxplorer:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "514ED912-D7FB-46CD-999C-4099D37DBF21", "vulnerable": true}, {"criteria": "cpe:2.3:a:ajaxplorer:ajaxplorer:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9ACB6977-00FC-49D4-ACAA-E5BDF51E2533", "vulnerable": true}, {"criteria": "cpe:2.3:a:ajaxplorer:ajaxplorer:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AF45470B-525A-4716-B3C7-E75A33E89466", "vulnerable": true}, {"criteria": "cpe:2.3:a:ajaxplorer:ajaxplorer:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0ABE4444-20F2-43D8-83BC-12839AA40AF3", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "AjaXplorer 3.2.x before 3.2.5 and 4.0.x before 4.0.4 does not properly perform cookie authentication, which allows remote attackers to obtain login access by leveraging knowledge of a password hash."}, {"lang": "es", "value": "AjaXplorer v3.2.x antes de v3.2.5 y v4.0.x antes de v4.0.4 no realiza debidamente la autenticaci\u00f3n de cookies, lo que permite a atacantes remotos iniciar una sesi\u00f3n aprovechandose de conocer el hash de una contrase\u00f1a."}], "id": "CVE-2012-1840", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-03-22T10:17:10.970", "references": [{"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://ajaxplorer.info/ajaxplorer-4-0-4/"}, {"source": "cve@mitre.org", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/504019"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74305"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://ajaxplorer.info/ajaxplorer-4-0-4/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/504019"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74305"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-287"}], "source": "nvd@nist.gov", "type": "Primary"}]}