{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2012-2436", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Multiple cross-site scripting (XSS) vulnerabilities in Pligg CMS before 1.2.2 allow remote attackers to inject arbitrary web script or HTML via (1) an arbitrary parameter in a move or (2) minimize action to admin/admin_index.php; (3) the karma_username parameter to module.php in the karma module; (4) q_1_low, (5) q_1_high, (6) q_2_low, or (7) q_2_high parameter in a configure action to module.php in the captcha module; or (8) the edit parameter to module.php in the admin_language module." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "url" : "http://secunia.com/secunia_research/2012-18/" }, { "url" : "https://www.htbridge.com/advisory/HTB23089" }, { "url" : "http://forums.pligg.com/downloads.php?do=file&id=15" }, { "url" : "http://pligg.svn.sourceforge.net/viewvc/pligg/trunk/modules/admin_language/admin_language_main.php?r1=2442&r2=2441&pathrev=2442" }, { "url" : "http://pligg.svn.sourceforge.net/viewvc/pligg?view=revision&revision=2440" }, { "url" : "http://pligg.svn.sourceforge.net/viewvc/pligg?view=revision&revision=2441" }, { "url" : "http://pligg.svn.sourceforge.net/viewvc/pligg?view=revision&revision=2452" }, { "url" : "http://www.securityfocus.com/bid/53625" }, { "url" : "http://www.securityfocus.com/bid/53662" }, { "url" : "http://secunia.com/advisories/45431" }, { "url" : "http://secunia.com/advisories/49257" }, { "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75764" }, { "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75834" } ] } }