René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

206 lines
7.7 KiB
JSON

{
"id": "CVE-2009-4052",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-11-23T17:30:00.750",
"lastModified": "2017-08-17T01:31:24.507",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the JSF Widget Library Runtime in IBM Rational Application Developer for WebSphere Software before 7.0.0.10 and Rational Software Architect before 7.0.0.10 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) the JSF Tree Control and (2) the JavaScript Resource Servlet."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en JSF Widget Library Runtime de IBM Rational Application Developer de WebSphere Software en versiones anteriores a la v7.0.0.10 y Rational Software Architect en versiones anteriores a la v7.0.0.10 permiten a los usuarios remotos inyectar codigo de script web o c\u00f3digo HTML a trav\u00e9s de vectores de ataque que involucran (1) JSF Tree Control y (2) JavaScript Resource Servlet."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "473829D7-3027-4F7C-9E44-D6EBBB5D0871"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8E18456C-7779-4408-932C-0E63DB619CF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "424A182E-561F-42A8-98FC-09E5E44F994E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "90194CF7-58CE-43AB-A4C1-0143517A8AE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B308DA0C-6E09-4A89-8FCD-59100F47587B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3AE51730-0929-4AFA-BF18-298F0389546B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "03D5C500-E712-461F-B1A6-7582A17436DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8EE5CF1E-9563-407D-A3CD-B63B5766C5C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD19C41-E08F-4022-9300-DBD56204794D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AE851829-20D2-4B2D-B3CF-3D068B483E87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_software_architect:7.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "73FACCC2-2CE2-43D5-B06C-85FD67D90297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_software_architect:7.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D52DF841-C80B-4C53-A014-8EFE151FD9E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_software_architect:7.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C5F515-19B6-4BC2-A28F-C08042A45FF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_software_architect:7.0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BF857688-54B1-42B8-B9B2-6CD325B2E922"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_software_architect:7.0.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BED1E176-0914-4201-BF55-3F0E4BCCBB40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_software_architect:7.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3C25E22B-B7D1-4632-BAD7-FDD0BF070A23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_software_architect:7.0.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "14166F79-8DEA-4A2E-8102-8C716609E36D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_software_architect:7.0.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA30626-D56F-4107-A54E-E0B9E879E3E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_software_architect:7.0.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3F7FCAE6-610D-43FD-9C05-FB3D085E4854"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_software_architect:7.0.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C9A1F66A-DF89-402D-A54B-2E973D79F9F0"
}
]
}
]
}
],
"references": [
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK90616",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK94324",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27012378",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27012558",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/37083",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54360",
"source": "cve@mitre.org"
}
]
}