Vulnerability Details : CVE-2008-4929
Potential exploit
MyBB (aka MyBulletinBoard) 1.4.2 uses insufficient randomness to compose filenames of uploaded files used as attachments, which makes it easier for remote attackers to read these files by guessing filenames.
Products affected by CVE-2008-4929
- cpe:2.3:a:mybb:mybb:1.4.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-4929
0.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 70 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-4929
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-01-17 |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | 2024-02-14 |
CWE ids for CVE-2008-4929
-
Assigned by: nvd@nist.gov (Primary)
-
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-4929
-
http://www.securityfocus.com/bid/31936
Broken Link;Third Party Advisory;VDB Entry
-
http://archives.neohapsis.com/archives/bugtraq/2008-10/0203.html
Broken Link;Exploit
-
http://archives.neohapsis.com/archives/fulldisclosure/2008-10/0472.html
Broken Link;Exploit
-
http://www.openwall.com/lists/oss-security/2008/11/01/2
oss-security - CVE request (Fwd: MyBB 1.4.2: Multiple Vulnerabilties)Exploit;Mailing List
-
http://www.vupen.com/english/advisories/2008/2967
Webmail: access your OVH emails on ovhcloud.com | OVHcloudBroken Link
Jump to