2024-07-14 02:06:08 +00:00

112 lines
3.6 KiB
JSON

{
"id": "CVE-2007-5727",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-10-30T21:46:00.000",
"lastModified": "2018-10-15T21:46:09.597",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incomplete blacklist vulnerability in the stripScripts function in common.php in OneOrZero Helpdesk 1.6.5.4, 1.6.4.2, and possibly other versions, allows remote attackers to conduct cross-site scripting (XSS) attacks and inject arbitrary web script or HTML via XSS sequences without SCRIPT tags in the description parameter to (1) tcreate.php or (2) tupdate.php, as demonstrated using an onmouseover event in a b tag."
},
{
"lang": "es",
"value": "Vulnerabilidad de lista negra incompleta en la funci\u00f3n stripScripts en common.php en OneOrZero Helpdesk 1.6.5.4, 1.6.4.2, y posiblemente otras versiones, permite a atacantes remotos llevar a cabo ataques de secuencias de comandos en sitios cruzados (XSS) y inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de secuencias XSS sin la etiqueta SCRIPT en el par\u00e1metro description en (1) tcreate.php o (2) tupdate.php, como se demostr\u00f3 utilizadno un evento onmouseover en una etiqueta b."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oneorzero:oneorzero_helpdesk:1.6.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFF0F1A-84D9-4816-8ECB-8E070E94F70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oneorzero:oneorzero_helpdesk:1.6.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F671473D-7DDA-407E-BDB1-586A4E9BCA86"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/38215",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/38836",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/27415",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/3320",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/482790/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/26208",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/26217",
"source": "cve@mitre.org"
}
]
}