René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

187 lines
6.7 KiB
JSON

{
"id": "CVE-2011-1360",
"sourceIdentifier": "cve@mitre.org",
"published": "2011-10-28T02:49:52.740",
"lastModified": "2017-08-17T01:34:05.917",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in IBM HTTP Server 2.0.47 and earlier, as used in WebSphere Application Server and other products, allow remote attackers to inject arbitrary web script or HTML via vectors involving unspecified documentation files in (1) manual/ibm/ and (2) htdocs/*/manual/ibm/."
},
{
"lang": "es",
"value": "vulnerabilidad m\u00faltiple en cross-site scripting (XSS) en IBM HTTP Server v2.0.47 y anteriores, se utiliza en WebSphere Application Server y otros productos, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados que involucran archivos de documentaci\u00f3n en (1) manual/ibm/ y (2) htdocs/*/manual/ibm/."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.0.47",
"matchCriteriaId": "7DE6D8D7-59B7-48C6-8FC9-09F865F8E2F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4E57CC63-1B22-4589-8C84-F790D5F6BCB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E0C0BA13-BCB4-43EF-B4DB-B36BF27268FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE49B4C-1ED3-4E87-B5CE-BCF223D6513F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.3.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B60329EF-4E6E-4BAA-AD34-D79588BD5FC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.3.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "322876F1-4AD3-45A8-9239-D80F430DDF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.3.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "03F8A4CD-81C4-482E-9D9C-80A80AAD1C94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "E5C3A030-EF04-4C82-BFD5-CF6459099B15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.3.19.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA78FCB-254B-4F93-A178-0B0CCD4F300C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.3.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5D138BA7-7740-4CD7-8464-5F78B0411FCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.3.19.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A66BEC-6D58-4306-97FB-B8937A31886D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.3.26:*:*:*:*:*:*:*",
"matchCriteriaId": "9F43768E-F635-4A5E-892E-F8A732AC9F96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.3.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCE51E2D-29DA-41D8-824A-05FD4D208ABB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.3.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7581135B-5A4C-48DA-8FCC-A06FB0C22072"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.3.28:*:*:*:*:*:*:*",
"matchCriteriaId": "B4ED546C-D170-475B-9BB5-F23EAAD8B035"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:1.3.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E30715B4-8BDA-48D7-A5C5-C5482C9F165E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "21666A59-E82A-4156-AB11-DE38756B3DD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:2.0.42:*:*:*:*:*:*:*",
"matchCriteriaId": "4BBE18AC-99F8-4D82-8724-B99E82F6892E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:2.0.42.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9075EC-9B80-45F8-AEDF-04A8C49C7C74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:http_server:2.0.42.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6F49DC1E-B67A-46CB-83B1-24FAFBDBE9E6"
}
]
}
]
}
],
"references": [
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21502580",
"source": "cve@mitre.org"
},
{
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM41293",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/50447",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69656",
"source": "cve@mitre.org"
}
]
}