cvelist/2009/2xxx/CVE-2009-2780.json

102 lines
3.2 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-17 23:25:21 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-2780",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-17 23:25:21 +00:00
"lang": "eng",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in 68 Classifieds 4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) cat parameter to category.php, view parameter to (2) login.php and (3) viewlisting.php, page parameter to (4) searchresults.php and (5) toplistings.php, and (6) member parameter to viewmember.php."
2017-10-16 12:31:07 -04:00
}
2019-03-17 23:25:21 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "56565",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/56565"
},
{
"name": "http://packetstormsecurity.org/0907-exploits/68classifieds-xss.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0907-exploits/68classifieds-xss.txt"
},
{
"name": "56568",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/56568"
},
{
"name": "56564",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/56564"
},
{
"name": "68classifieds-multiple-xss(52071)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52071"
},
{
"name": "56566",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/56566"
},
{
"name": "56569",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/56569"
},
{
"name": "36034",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36034"
},
{
"name": "56567",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/56567"
}
]
}
}