mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
348 lines
12 KiB
JSON
348 lines
12 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2008-1232",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20080801 [CVE-2008-1232] Apache Tomcat XSS vulnerability",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/495021/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "20090616 CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/504351/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "20090806 CA20090806-02: Security Notice for Unicenter Asset Portfolio Management, Unicenter Desktop and Server Management, Unicenter Patch Management",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/505556/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "http://tomcat.apache.org/security-4.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://tomcat.apache.org/security-4.html"
|
|
},
|
|
{
|
|
"name" : "http://tomcat.apache.org/security-5.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://tomcat.apache.org/security-5.html"
|
|
},
|
|
{
|
|
"name" : "http://tomcat.apache.org/security-6.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://tomcat.apache.org/security-6.html"
|
|
},
|
|
{
|
|
"name" : "http://support.apple.com/kb/HT3216",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://support.apple.com/kb/HT3216"
|
|
},
|
|
{
|
|
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm"
|
|
},
|
|
{
|
|
"name" : "http://www.vmware.com/security/advisories/VMSA-2009-0002.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.vmware.com/security/advisories/VMSA-2009-0002.html"
|
|
},
|
|
{
|
|
"name" : "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx"
|
|
},
|
|
{
|
|
"name" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500"
|
|
},
|
|
{
|
|
"name" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095"
|
|
},
|
|
{
|
|
"name" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
|
|
},
|
|
{
|
|
"name" : "APPLE-SA-2008-10-09",
|
|
"refsource" : "APPLE",
|
|
"url" : "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
|
|
},
|
|
{
|
|
"name" : "FEDORA-2008-8113",
|
|
"refsource" : "FEDORA",
|
|
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html"
|
|
},
|
|
{
|
|
"name" : "FEDORA-2008-8130",
|
|
"refsource" : "FEDORA",
|
|
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html"
|
|
},
|
|
{
|
|
"name" : "FEDORA-2008-7977",
|
|
"refsource" : "FEDORA",
|
|
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html"
|
|
},
|
|
{
|
|
"name" : "HPSBUX02401",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=123376588623823&w=2"
|
|
},
|
|
{
|
|
"name" : "SSRT090005",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=123376588623823&w=2"
|
|
},
|
|
{
|
|
"name" : "HPSBST02955",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
|
|
},
|
|
{
|
|
"name" : "MDVSA-2008:188",
|
|
"refsource" : "MANDRIVA",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188"
|
|
},
|
|
{
|
|
"name" : "RHSA-2008:0648",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0648.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2008:0862",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0862.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2008:0864",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0864.html"
|
|
},
|
|
{
|
|
"name" : "SUSE-SR:2008:018",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
|
|
},
|
|
{
|
|
"name" : "SUSE-SR:2009:004",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
|
|
},
|
|
{
|
|
"name" : "30496",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/30496"
|
|
},
|
|
{
|
|
"name" : "31681",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/31681"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:5985",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5985"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:11181",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11181"
|
|
},
|
|
{
|
|
"name" : "33999",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/33999"
|
|
},
|
|
{
|
|
"name" : "34013",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/34013"
|
|
},
|
|
{
|
|
"name" : "35474",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/35474"
|
|
},
|
|
{
|
|
"name" : "36108",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/36108"
|
|
},
|
|
{
|
|
"name" : "37460",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/37460"
|
|
},
|
|
{
|
|
"name" : "57126",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/57126"
|
|
},
|
|
{
|
|
"name" : "ADV-2008-2305",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2008/2305"
|
|
},
|
|
{
|
|
"name" : "ADV-2008-2823",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2008/2823"
|
|
},
|
|
{
|
|
"name" : "ADV-2008-2780",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2008/2780"
|
|
},
|
|
{
|
|
"name" : "ADV-2009-0320",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2009/0320"
|
|
},
|
|
{
|
|
"name" : "1020622",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://www.securitytracker.com/id?1020622"
|
|
},
|
|
{
|
|
"name" : "31379",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/31379"
|
|
},
|
|
{
|
|
"name" : "31381",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/31381"
|
|
},
|
|
{
|
|
"name" : "31639",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/31639"
|
|
},
|
|
{
|
|
"name" : "31891",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/31891"
|
|
},
|
|
{
|
|
"name" : "31865",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/31865"
|
|
},
|
|
{
|
|
"name" : "32222",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/32222"
|
|
},
|
|
{
|
|
"name" : "31982",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/31982"
|
|
},
|
|
{
|
|
"name" : "33797",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/33797"
|
|
},
|
|
{
|
|
"name" : "32120",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/32120"
|
|
},
|
|
{
|
|
"name" : "32266",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/32266"
|
|
},
|
|
{
|
|
"name" : "4098",
|
|
"refsource" : "SREASON",
|
|
"url" : "http://securityreason.com/securityalert/4098"
|
|
},
|
|
{
|
|
"name" : "ADV-2009-0503",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2009/0503"
|
|
},
|
|
{
|
|
"name" : "ADV-2009-1609",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2009/1609"
|
|
},
|
|
{
|
|
"name" : "ADV-2009-2194",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2009/2194"
|
|
},
|
|
{
|
|
"name" : "ADV-2009-3316",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2009/3316"
|
|
},
|
|
{
|
|
"name" : "tomcat-httpservletresponse-xss(44155)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44155"
|
|
}
|
|
]
|
|
}
|
|
}
|