mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
82 lines
2.7 KiB
JSON
82 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2010-1618",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the phpCAS client library before 1.1.0, as used in Moodle 1.8.x before 1.8.12 and 1.9.x before 1.9.8, allows remote attackers to inject arbitrary web script or HTML via a crafted URL, which is not properly handled in an error message."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://www.ja-sig.org/wiki/display/CASC/phpCAS+ChangeLog",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.ja-sig.org/wiki/display/CASC/phpCAS+ChangeLog"
|
|
},
|
|
{
|
|
"name": "ADV-2010-1107",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2010/1107"
|
|
},
|
|
{
|
|
"name": "http://moodle.org/security/",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://moodle.org/security/"
|
|
},
|
|
{
|
|
"name": "SUSE-SR:2010:011",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
|
|
},
|
|
{
|
|
"name": "http://www.ja-sig.org/issues/browse/PHPCAS-52",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.ja-sig.org/issues/browse/PHPCAS-52"
|
|
}
|
|
]
|
|
}
|
|
} |