mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
132 lines
4.8 KiB
JSON
132 lines
4.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2012-2399",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Cross-site scripting (XSS) vulnerability in swfupload.swf in SWFupload 2.2.0.1 and earlier, as used in WordPress before 3.5.2, TinyMCE Image Manager 1.1 and earlier, and other products allows remote attackers to inject arbitrary web script or HTML via the buttonText parameter, a different vulnerability than CVE-2012-3414."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/swfupload/swfupload.swf?rev=20503",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/swfupload/swfupload.swf?rev=20503"
|
|
},
|
|
{
|
|
"name": "wordpress-swfupload-unspecified(75210)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75210"
|
|
},
|
|
{
|
|
"name": "81459",
|
|
"refsource": "OSVDB",
|
|
"url": "http://osvdb.org/81459"
|
|
},
|
|
{
|
|
"name": "49138",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/49138"
|
|
},
|
|
{
|
|
"name": "http://packetstormsecurity.com/files/122399/tinymce11-xss.txt",
|
|
"refsource": "MISC",
|
|
"url": "http://packetstormsecurity.com/files/122399/tinymce11-xss.txt"
|
|
},
|
|
{
|
|
"name": "91134",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/91134"
|
|
},
|
|
{
|
|
"name": "DSA-2470",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2012/dsa-2470"
|
|
},
|
|
{
|
|
"name": "http://packetstormsecurity.com/files/120746/SWFUpload-Content-Spoofing-Cross-Site-Scripting.html",
|
|
"refsource": "MISC",
|
|
"url": "http://packetstormsecurity.com/files/120746/SWFUpload-Content-Spoofing-Cross-Site-Scripting.html"
|
|
},
|
|
{
|
|
"name": "[oss-security] 20130718 Re: Re: SWFUpload <= (Object Injection/CSRF) Vulnerabilities Multiple flaws",
|
|
"refsource": "MLIST",
|
|
"url": "http://www.openwall.com/lists/oss-security/2013/07/18/13"
|
|
},
|
|
{
|
|
"name": "http://make.wordpress.org/core/2013/06/21/secure-swfupload/",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://make.wordpress.org/core/2013/06/21/secure-swfupload/"
|
|
},
|
|
{
|
|
"name": "53192",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/53192"
|
|
},
|
|
{
|
|
"name": "http://wordpress.org/news/2012/04/wordpress-3-3-2/",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/"
|
|
},
|
|
{
|
|
"name": "JVNDB-2012-002110",
|
|
"refsource": "JVNDB",
|
|
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-002110"
|
|
},
|
|
{
|
|
"name": "JVN#25280162",
|
|
"refsource": "JVN",
|
|
"url": "http://jvn.jp/en/jp/JVN25280162/index.html"
|
|
},
|
|
{
|
|
"name": "20130310 CS and XSS vulnerabilities in SWFUpload",
|
|
"refsource": "FULLDISC",
|
|
"url": "http://seclists.org/fulldisclosure/2013/Mar/110"
|
|
}
|
|
]
|
|
}
|
|
} |