mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
77 lines
2.7 KiB
JSON
77 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2011-5042",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Cross-site scripting (XSS) vulnerability in inc/lib/lib.base.php in SASHA 0.2.0 allows remote attackers to inject arbitrary web script or HTML via the instructors parameter. NOTE: the original disclosure also mentions the section_title parameter, but this was disputed by the vendor and retracted by the original researcher."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://sourceforge.net/apps/mantisbt/sasha/view.php?id=13",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://sourceforge.net/apps/mantisbt/sasha/view.php?id=13"
|
|
},
|
|
{
|
|
"name": "20111218 SASHA v0.2.0 Mutiple XSS",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0123.html"
|
|
},
|
|
{
|
|
"name": "sasha-multiple-xss(71874)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71874"
|
|
},
|
|
{
|
|
"name": "http://sasha.svn.sourceforge.net/viewvc/sasha/branches/SASHA_0.2/SASHA/inc/lib/lib.base.php?r1=95&r2=96&pathrev=96",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://sasha.svn.sourceforge.net/viewvc/sasha/branches/SASHA_0.2/SASHA/inc/lib/lib.base.php?r1=95&r2=96&pathrev=96"
|
|
}
|
|
]
|
|
}
|
|
} |