2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-0933" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-03-17T22:30:00.187" ,
"lastModified" : "2017-08-17T01:30:06.507" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cross-site scripting (XSS) vulnerability in the administrative interface in Dotclear before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Dotclear anterior a v2.1.5 permite a atacantes inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores sin especificar."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.3
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.1.4" ,
"matchCriteriaId" : "B673A5B1-A3EE-4CCE-ACD7-08D3FA68E2CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:1.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "94896556-5D43-4C54-A49C-301511B69EB4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:1.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BE7B92DB-62E4-4F4F-BC57-2C5F646C13CD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:1.2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "49EEF727-A23D-47AE-BE4E-238290246BE5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:1.2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "860F6A6A-717B-4B94-B4D0-26C2BAC1E66D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:1.2.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9ED66191-F39E-4D78-9B3D-1A20FD2914B8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:1.2.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2AFFAE76-D4DE-4F4C-B165-736EA01B30EC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:1.2.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E58D04A0-17E9-46E5-9C18-502746371365"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:1.2.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AAAF4270-05C5-487F-8A30-A96C4E943621"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D5F73A6E-6D4F-45D8-98AC-73ABFF55CDBF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.0:beta_2:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC1A3960-F1D6-40FF-8E42-B330B347A686"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.0:beta_3:*:*:*:*:*:*" ,
"matchCriteriaId" : "A3EE6B1E-3D40-4D61-B5D5-4D9B8A6FAD10"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.0:beta_4:*:*:*:*:*:*" ,
"matchCriteriaId" : "CF6BAC55-C04C-4174-965C-A590BDA7748F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.0:beta_5.2:*:*:*:*:*:*" ,
"matchCriteriaId" : "AB76F976-A236-484A-98BA-269BAF196D93"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.0:beta_5.4:*:*:*:*:*:*" ,
"matchCriteriaId" : "30451C6F-53FA-4FDD-9ED0-849C099093C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.0:beta_6:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8E4C138-8CD6-4F8B-B45E-FC62FF225358"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.0:beta_7:*:*:*:*:*:*" ,
"matchCriteriaId" : "18C6F78A-10EE-4B7E-83F0-51386519100A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.0:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "C9AD6711-6C1D-4DB3-8BB5-4A6CE7234D5D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.0:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "975A3BEA-86E6-4366-91B7-94B7AE709927"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2E64EFF2-3A11-4B05-9AC8-C86C05183B0E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C1C53E97-A2A5-4819-B547-8B1784BE27A3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A49E0B5D-E551-4D94-995D-B9C015617FF1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "938B7159-8C33-4810-B788-77A7405CE841"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dotclear:dotclear:2.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C2CAD49D-1A73-4C6F-9509-1F58EC172CC8"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://dotclear.org/blog/post/2009/02/05/Dotclear-2.1.5" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/34181" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/bid/34036" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/0636" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49138" ,
"source" : "cve@mitre.org"
}
]
}