Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:lockon:ec-cube:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA9F06AA-3D2A-41B1-91DF-B19F0AEBE660", "versionEndIncluding": "2.4.4", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FF341A1B-2FFF-46B1-82E5-883681F3467C", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "54999245-399B-4535-8F2C-1F19CB06A053", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "A7FEF399-9399-4F4D-B866-763695F09ADA", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "2194828B-243E-49A2-8D71-B61B6C440FF3", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "34B1FC17-8F5F-4B35-AB42-01A77BB87EC4", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "E37E68F4-EC08-4A33-8CD2-9B854E51A6E4", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:beta:*:*:*:*:*:*", "matchCriteriaId": "8A85840E-73A5-411D-912A-A1CEA7852904", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "C34FB238-1A64-4CBB-AAF6-FDE6BA90A096", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC0C6C78-3FD3-4AA3-95B0-CF798396E802", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "933ADEC5-451B-4DAA-AB23-7CD8A9A64954", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "3EFDD02C-56D4-480E-8FF3-E4B63554CB26", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "1C4BC181-D123-460C-9BF8-6B8FB800697C", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "8C40A7B5-639C-4390-B91E-BEC404B5ED1B", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "2D261CC2-F7E5-437E-884B-D25C72F939C6", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA1710AF-A87A-4970-BF19-481040A7524A", "vulnerable": true}, {"criteria": "cpe:2.3:a:lockon:ec-cube:2.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C72DED8-1073-47A9-B089-84E3ABC96401", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "data/class/pages/shopping/LC_Page_Shopping_Deliv.php in LOCKON EC-CUBE 2.4.4 and earlier, and 2.11.0 through 2.12.2, allows remote attackers to modify data via unspecified vectors."}, {"lang": "es", "value": "data/class/pages/shopping/LC_Page_Shopping_Deliv.php en LOCKON EC-CUBE 2.4.4 y anteriores versiones, y 2.11.0 hasta la versi\u00f3n 2.12.2, permite a atacantes remotos modificar datos a trav\u00e9s de vectores sin especificar."}], "id": "CVE-2014-0807", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-01-22T21:55:03.683", "references": [{"source": "vultures@jpcert.or.jp", "url": "http://jvn.jp/en/jp/JVN17849447/index.html"}, {"source": "vultures@jpcert.or.jp", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000005"}, {"source": "vultures@jpcert.or.jp", "tags": ["Exploit", "Vendor Advisory"], "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=56"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN17849447/index.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000005"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"], "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=56"}], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}