mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
83 lines
2.5 KiB
JSON
83 lines
2.5 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2008-6127",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Multiple cross-site scripting (XSS) vulnerabilities in moziloCMS 1.10.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) page and (2) query parameters to (a) index.php, (3) cat and (4) file parameters to (b) download.php, (5) gal parameter to gallery.php, and the (6) URL to admin/login.php."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "http://www.majorsecurity.de/index_2.php?major_rls=major_rls55",
|
|
"refsource" : "MISC",
|
|
"url" : "http://www.majorsecurity.de/index_2.php?major_rls=major_rls55"
|
|
},
|
|
{
|
|
"name" : "http://cms.mozilo.de/index.php?cat=10_moziloCMS&page=60_Changelog",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://cms.mozilo.de/index.php?cat=10_moziloCMS&page=60_Changelog"
|
|
},
|
|
{
|
|
"name" : "31495",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/31495"
|
|
},
|
|
{
|
|
"name" : "32021",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/32021"
|
|
},
|
|
{
|
|
"name" : "mozilocms-index-xss(45525)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45525"
|
|
}
|
|
]
|
|
}
|
|
}
|