发布时间 :2005-05-16 00:00:00
修订时间 :2017-07-10 21:32:42

[原文]Multiple unknown vulnerabilities in the Blocks module in Spidean AutoTheme 1.7 and AT-Lite for PostNuke have unknown impact.

[CNNVD]AutoTheme PostNuke Module多个未明漏洞(CNNVD-200505-1036)

        Spidean AutoTheme 1.7及AT-Lite for PostNuke中的Blocks模块存在多个未知漏洞,具有未知影响。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  XF  autotheme-pnadminphp-gain-access(20490)

- 漏洞信息

AutoTheme PostNuke Module多个未明漏洞
中危 资料不足
2005-05-16 00:00:00 2005-10-20 00:00:00
        Spidean AutoTheme 1.7及AT-Lite for PostNuke中的Blocks模块存在多个未知漏洞,具有未知影响。

- 公告与补丁


- 漏洞信息

AutoTheme for PostNuke Blocks Module pnadmin.php Unspecified Remote Privilege Escalation
Remote / Network Access Attack Type Unknown
Loss of Integrity
Exploit Unknown

- 漏洞描述

AutoTheme for PostNuke contains a flaw related to the pnadmin.php module that may allow an attacker to gain access to unauthorized privileges. No further details have been provided.

- 时间线

2005-05-06 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Spidean has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

AutoTheme PostNuke Module Multiple Unspecified Vulnerabilities
Unknown 13539
Yes No
2005-05-06 12:00:00 2009-07-12 02:06:00
Reported by the vendor.

- 受影响的程序版本

Spidean AutoTheme 1.7
Spidean AT-Lite .8

- 漏洞讨论

AutoTheme for PostNuke is reported prone to multiple unspecified vulnerabilities. The causes and impacts of these issues were not specified.

Due to a lack of details, further information is not currently available. This BID will be updated and divided into individuals BIDs when more information becomes available.

AutoTheme 1.7 and AT-Lite .8 for PostNuke are vulnerable to these issues.

- 漏洞利用

An exploit is likely not required.

- 解决方案

The vendor has released a temporary fix to address these issues. It is available at the following location:

- 相关参考