{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T19:00:39.478","vulnerabilities":[{"cve":{"id":"CVE-2018-1000551","sourceIdentifier":"cve@mitre.org","published":"2018-06-26T16:29:02.617","lastModified":"2024-11-21T03:40:10.797","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Trovebox version <= 4.0.0-rc6 contains a PHP Type juggling vulnerability in album view component that can result in Authentication bypass. This attack appear to be exploitable via HTTP Request. This vulnerability appears to have been fixed in after commit 742b8edbe."},{"lang":"es","value":"Trovebox, en versiones 4.0.0-rc6 y anteriores, contiene una vulnerabilidad de malabares de tipos PHP en el componente album view que puede resultar en la omisión de autenticación. Parece ser que este ataque puede ser explotado mediante una petición HTTP. La vulnerabilidad parece haber sido solucionada tras el commit con ID 742b8edbe."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trovebox:trovebox:*:*:*:*:*:*:*:*","versionEndIncluding":"3.0.0","matchCriteriaId":"78F6699A-A397-4D6A-970A-E7123622C5CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:trovebox:trovebox:4.0.0:rc2:*:*:*:*:*:*","matchCriteriaId":"BD80BAFE-28C1-49F1-AE8C-0E0BC943AA67"},{"vulnerable":true,"criteria":"cpe:2.3:a:trovebox:trovebox:4.0.0:rc5:*:*:*:*:*:*","matchCriteriaId":"8A011E31-96B1-4979-A4C4-83639B024693"},{"vulnerable":true,"criteria":"cpe:2.3:a:trovebox:trovebox:4.0.0:rc6:*:*:*:*:*:*","matchCriteriaId":"F6946C75-E3BE-475C-B4BB-B41EFE5D86ED"}]}]}],"references":[{"url":"https://telekomsecurity.github.io/2018/04/trovebox-vulnerabilities.html","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://telekomsecurity.github.io/2018/04/trovebox-vulnerabilities.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}