94 lines
2.4 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2003-1554",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-12-31T05:00:00.000",
"lastModified": "2018-10-19T15:29:55.233",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in scozbook/add.php in ScozNet ScozBook 1.1 BETA allows remote attackers to inject arbitrary web script or HTML via the (1) username, (2) useremail, (3) aim, (4) msn, (5) sitename and (6) siteaddy variables."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:scoznet:scozbook:1.1_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "9F36523F-6E2F-42D7-B1B9-897E69654CAC"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/3781",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/316747/30/25280/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/7235",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1006413",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11658",
"source": "cve@mitre.org"
}
]
}