286 lines
9.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2004-2651",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-12-31T05:00:00.000",
"lastModified": "2024-11-20T23:53:53.887",
2023-04-24 12:24:31 +02:00
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in YaCy before 0.32 allow remote attackers to inject arbitrary web script or HTML via the (1) urlmaskfilter parameter to index.html or the (2) page parameter to Wiki.html."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.1_build2004-01-19:*:*:*:*:*:*:*",
"matchCriteriaId": "CD51396A-60D6-411F-8A6D-A665D7F086E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.11_build2004-01-24:*:*:*:*:*:*:*",
"matchCriteriaId": "5615D5BE-70CE-4C42-862D-E4EC8E7FCAC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.12_build2004-02-04:*:*:*:*:*:*:*",
"matchCriteriaId": "2AA76E5A-0CE8-422F-8C45-4A431BCDFB0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.13_build2004-02-10:*:*:*:*:*:*:*",
"matchCriteriaId": "B16AE207-B9D3-469D-9102-9699F37F05A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.14_build2004-02-13:*:*:*:*:*:*:*",
"matchCriteriaId": "AA2398A7-2BC8-4D61-8A96-6B2733F969B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.15_build2004-03-18:*:*:*:*:*:*:*",
"matchCriteriaId": "855B5A40-BA77-4C7B-BEA0-D1BC2CB16E1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.16_build2004-05-03:*:*:*:*:*:*:*",
"matchCriteriaId": "467CB8FF-3022-4294-AB4F-EFFF0637A553"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.20_build2004-06-14:*:*:*:*:*:*:*",
"matchCriteriaId": "CF09D549-C540-428C-B616-1709C7224C6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.21_build2004-06-27:*:*:*:*:*:*:*",
"matchCriteriaId": "C92E2772-A440-43B1-9897-075AB8C07310"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.22_build2004-07-11:*:*:*:*:*:*:*",
"matchCriteriaId": "8CF6FE0C-54A0-42B9-A960-866A111B7F43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.23_build2004-08-08:*:*:*:*:*:*:*",
"matchCriteriaId": "B40D1222-0DA2-409E-B53C-F2C6910FF32D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.24_build2004-08-16:*:*:*:*:*:*:*",
"matchCriteriaId": "2179CD5C-59F5-4FF6-8C00-44DBBC15D084"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.25_build2004-08-22:*:*:*:*:*:*:*",
"matchCriteriaId": "CE1DDC0E-8146-4F48-B672-28CB8E4A337A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.26_build2004-09-16:*:*:*:*:*:*:*",
"matchCriteriaId": "D740CD27-9692-43E8-950E-1EBC4367C7E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.27_build2004-09-24:*:*:*:*:*:*:*",
"matchCriteriaId": "04EFD8AB-4884-4FA8-8607-69104BB25976"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.28_build2004-10-01:*:*:*:*:*:*:*",
"matchCriteriaId": "AFA08BCA-2EAD-40D3-82D9-534B09F32F3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.29_build2004-10-22:*:*:*:*:*:*:*",
"matchCriteriaId": "1D0A9201-C5E9-4FBF-8C33-16B3EF4C1063"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.30_build2004-11-25:*:*:*:*:*:*:*",
"matchCriteriaId": "AE9614DD-D293-49BC-86AE-31EDEC60E348"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:0.31_build2004-12-09:*:*:*:*:*:*:*",
"matchCriteriaId": "8A191F6A-15F7-4EAD-B784-A716CA2410A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:build2003-12-15:*:*:*:*:*:*:*",
"matchCriteriaId": "6847C171-862E-4DDF-BBDE-C463ED743BB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:build2003-12-18:*:*:*:*:*:*:*",
"matchCriteriaId": "EC57CC4A-F535-42F7-9F73-113A7577621E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:build2003-12-29:*:*:*:*:*:*:*",
"matchCriteriaId": "381A6A3C-8860-41BC-A65D-97CC95112618"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:build2004-01-05:*:*:*:*:*:*:*",
"matchCriteriaId": "06D988EA-94ED-4AFF-B3FD-CDD9E898183C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:build2004-01-07:*:*:*:*:*:*:*",
"matchCriteriaId": "349E575E-E47A-48CF-9290-50BFABBF0D1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:michael_christen:yacy:build2004-01-10:*:*:*:*:*:*:*",
"matchCriteriaId": "E739D42E-096C-4C51-B64D-0C41E20514C2"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-12/0413.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1012686",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.osvdb.org/12629",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/12630",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.securityfocus.com/bid/12104",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.yacy.net/yacy/News.html",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18688",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18690",
"source": "cve@mitre.org"
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-12/0413.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1012686",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.osvdb.org/12629",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.osvdb.org/12630",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/12104",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.yacy.net/yacy/News.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18688",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18690",
"source": "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}