mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
117 lines
4.5 KiB
JSON
117 lines
4.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert_us@oracle.com",
|
|
"ID": "CVE-2013-5855",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Oracle Mojarra 2.2.x before 2.2.6 and 2.1.x before 2.1.28 does not perform appropriate encoding when a (1) <h:outputText> tag or (2) EL expression is used after a scriptor style block, which allows remote attackers to conduct cross-site scripting (XSS) attacks via application-specific vectors."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "RHSA-2015:0765",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-0765.html"
|
|
},
|
|
{
|
|
"name": "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/JSF-outputText-tag-the-good-the-bad-and-the-ugly/ba-p/6368011#.U8ccVPlXZHU",
|
|
"refsource": "MISC",
|
|
"url": "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/JSF-outputText-tag-the-good-the-bad-and-the-ugly/ba-p/6368011#.U8ccVPlXZHU"
|
|
},
|
|
{
|
|
"name": "RHSA-2015:0675",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html"
|
|
},
|
|
{
|
|
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
|
|
},
|
|
{
|
|
"name": "RHSA-2015:0720",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html"
|
|
},
|
|
{
|
|
"name": "65600",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/65600"
|
|
},
|
|
{
|
|
"name": "https://java.net/jira/browse/JAVASERVERFACES_SPEC_PUBLIC-1258",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://java.net/jira/browse/JAVASERVERFACES_SPEC_PUBLIC-1258"
|
|
},
|
|
{
|
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
|
|
},
|
|
{
|
|
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
|
|
},
|
|
{
|
|
"name": "https://java.net/jira/browse/JAVASERVERFACES-3150",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://java.net/jira/browse/JAVASERVERFACES-3150"
|
|
},
|
|
{
|
|
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
|
"refsource": "FULLDISC",
|
|
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
|
|
}
|
|
]
|
|
}
|
|
} |