cvelist/2008/1xxx/CVE-2008-1243.json

83 lines
2.4 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2008-1243",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Cross-site scripting (XSS) vulnerability on the Linksys WRT300N router with firmware 2.00.20, when Mozilla Firefox or Apple Safari is used, allows remote attackers to inject arbitrary web script or HTML via the dyndns_domain parameter to the default URI."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20080301 The Router Hacking Challenge is Over!",
"refsource" : "BUGTRAQ",
2018-10-11 16:05:44 -04:00
"url" : "http://www.securityfocus.com/archive/1/489009/100/0/threaded"
2017-10-16 12:31:07 -04:00
},
{
"name" : "http://code.bulix.org/cx46qa-65489",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "http://code.bulix.org/cx46qa-65489"
},
{
"name" : "http://code.bulix.org/koom78-65490",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "http://code.bulix.org/koom78-65490"
},
{
"name" : "http://www.gnucitizen.org/projects/router-hacking-challenge/",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "http://www.gnucitizen.org/projects/router-hacking-challenge/"
},
{
"name" : "linksys-wrt300n-dyndnsdomain-xss(41121)",
"refsource" : "XF",
2017-10-16 12:31:07 -04:00
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41121"
}
]
}
}