96 lines
2.6 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-3308",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-10-26T01:02:00.000",
"lastModified": "2017-07-11T01:33:09.203",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Zomplog 3.4 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) comment parameter in detail.php, (3) the username parameter in get.php, and (4) the search parameter in index.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zomplog:zomplog:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8D6326-D8CC-4F51-B4A0-71BF162E5824"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zomplog:zomplog:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A2B40804-E719-41D9-9AFF-B3AF3AC13DFC"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=113019053831123&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/alerts/2005/Oct/1015088.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/15168",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22828",
"source": "cve@mitre.org"
}
]
}