mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
87 lines
2.7 KiB
JSON
87 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2010-1958",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the FileField module 5.x before 5.x-2.5 and 6.x before 6.x-3.4 for Drupal allows remote authenticated users, with create or edit permissions and 'Path to File' or 'URL to File' display enabled, to inject arbitrary web script or HTML via the file name (filepath parameter)."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "65611",
|
|
"refsource": "OSVDB",
|
|
"url": "http://osvdb.org/65611"
|
|
},
|
|
{
|
|
"name": "filefieldmodule-filepath-xss(59500)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59500"
|
|
},
|
|
{
|
|
"name": "http://drupal.org/node/829808",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://drupal.org/node/829808"
|
|
},
|
|
{
|
|
"name": "http://www.madirish.net/?article=461",
|
|
"refsource": "MISC",
|
|
"url": "http://www.madirish.net/?article=461"
|
|
},
|
|
{
|
|
"name": "40186",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/40186"
|
|
},
|
|
{
|
|
"name": "40923",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/40923"
|
|
}
|
|
]
|
|
}
|
|
} |