mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
87 lines
2.7 KiB
JSON
87 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2003-1554",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Cross-site scripting (XSS) vulnerability in scozbook/add.php in ScozNet ScozBook 1.1 BETA allows remote attackers to inject arbitrary web script or HTML via the (1) username, (2) useremail, (3) aim, (4) msn, (5) sitename and (6) siteaddy variables."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "20030329 ScozBook BETA 1.1 vulnerabilities",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/316747/30/25280/threaded"
|
|
},
|
|
{
|
|
"name": "8476",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/8476"
|
|
},
|
|
{
|
|
"name": "7235",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/7235"
|
|
},
|
|
{
|
|
"name": "3781",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/3781"
|
|
},
|
|
{
|
|
"name": "scozbook-add-xss(11658)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11658"
|
|
},
|
|
{
|
|
"name": "1006413",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id?1006413"
|
|
}
|
|
]
|
|
}
|
|
} |