René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

122 lines
3.5 KiB
JSON

{
"id": "CVE-2003-1511",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-12-31T05:00:00.000",
"lastModified": "2008-09-05T20:37:07.697",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Bajie Java HTTP Server 0.95 through 0.95zxv4 allows remote attackers to inject arbitrary web script or HTML via (1) the query string to test.txt, (2) the guestName parameter to the custMsg servlet, or (3) the cookiename parameter to the CookieExample servlet."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bajie:java_http_server:0.95:*:*:*:*:*:*:*",
"matchCriteriaId": "C4BB8346-EFEC-434E-95D1-294EC5580CA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bajie:java_http_server:0.95:d:*:*:*:*:*:*",
"matchCriteriaId": "ECE86194-3115-4E9D-AEBF-469E8E79771B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bajie:java_http_server:0.95:zxc:*:*:*:*:*:*",
"matchCriteriaId": "67BD5099-B55E-4F03-A54A-F41A3E6CD27E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bajie:java_http_server:0.95:zxe:*:*:*:*:*:*",
"matchCriteriaId": "FEE9C18B-0FD3-406C-8967-3D1FB3B2A978"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bajie:java_http_server:0.95:zxe1:*:*:*:*:*:*",
"matchCriteriaId": "9C106CC8-60B8-4556-A19E-1F7BB7926812"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bajie:java_http_server:0.95:zxv4:*:*:*:*:*:*",
"matchCriteriaId": "906DEE36-7203-4A9B-9022-F5972C38C471"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/3306",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.geocities.com/gzhangx/websrv/docs/security.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/341452",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/8841",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
}
]
}