{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T17:00:50.484","vulnerabilities":[{"cve":{"id":"CVE-2004-1516","sourceIdentifier":"cve@mitre.org","published":"2004-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CRLF injection vulnerability in index.php in phpWebSite 0.9.3-4 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the block_username parameter in the user module."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:phpwebsite:phpwebsite:0.7.3:*:*:*:*:*:*:*","matchCriteriaId":"47B0B838-401F-447D-A270-6B3C7416A2ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:phpwebsite:phpwebsite:0.8.2:*:*:*:*:*:*:*","matchCriteriaId":"90DF86C4-176B-4E4E-AF89-15F090E9C0F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:phpwebsite:phpwebsite:0.8.3:*:*:*:*:*:*:*","matchCriteriaId":"9F3EAD02-CF8D-4154-9A67-9774BA4029AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:phpwebsite:phpwebsite:0.9.3:*:*:*:*:*:*:*","matchCriteriaId":"B72337C8-2B5C-4824-A3C0-D41A857DC9C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:phpwebsite:phpwebsite:0.9.3.1:*:*:*:*:*:*:*","matchCriteriaId":"454BEBD6-3EC7-4FFB-A51A-0199B5CCF097"},{"vulnerable":true,"criteria":"cpe:2.3:a:phpwebsite:phpwebsite:0.9.3.2:*:*:*:*:*:*:*","matchCriteriaId":"6A381433-9331-4424-B349-52D7F4BFEABA"},{"vulnerable":true,"criteria":"cpe:2.3:a:phpwebsite:phpwebsite:0.9.3.3:*:*:*:*:*:*:*","matchCriteriaId":"4DC225BD-FA8E-482B-9537-77797B7A88BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:phpwebsite:phpwebsite:0.9.3.4:*:*:*:*:*:*:*","matchCriteriaId":"682290A8-AEB7-4652-A44C-A969AB937BAF"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=110022027420583&w=2","source":"cve@mitre.org"},{"url":"http://phpwebsite.appstate.edu/index.php?module=announce&ANN_id=863&ANN_user_op=view","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://secunia.com/advisories/13172/","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-200411-35.xml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/11673","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18046","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=110022027420583&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://phpwebsite.appstate.edu/index.php?module=announce&ANN_id=863&ANN_user_op=view","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://secunia.com/advisories/13172/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-200411-35.xml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/11673","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18046","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}