mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
117 lines
3.9 KiB
JSON
117 lines
3.9 KiB
JSON
{
|
|
"id": "CVE-2015-6061",
|
|
"sourceIdentifier": "secure@microsoft.com",
|
|
"published": "2015-11-11T11:59:33.333",
|
|
"lastModified": "2018-10-12T22:10:11.717",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in Microsoft Skype for Business 2016, Lync 2010 and 2013 SP1, Lync 2010 Attendee, and Lync Room System allows remote attackers to inject arbitrary web script or HTML via an instant-message session, aka \"Server Input Validation Information Disclosure Vulnerability.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de XSS en Microsoft Skype for Business 2016, Lync 2010 y 2013 SP1, Lync 2010 Attendee y Lync Room System permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de una sesi\u00f3n de mensaje instant\u00e1neo, tambi\u00e9n conocida como 'Server Input Validation Information Disclosure Vulnerability'."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:lync:2010:*:*:*:*:*:x64:*",
|
|
"matchCriteriaId": "4426F8EF-9C49-4C77-B6D0-1A1865D02541"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:lync:2010:*:*:*:*:*:x86:*",
|
|
"matchCriteriaId": "860C65B6-5CEA-4A9F-AC37-EF185132E8CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:lync:2010:*:*:*:attendee:*:*:*",
|
|
"matchCriteriaId": "6C3ED4FC-2583-4E51-8931-082875A97034"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:x64:*",
|
|
"matchCriteriaId": "1B0382F7-00EA-4057-A23E-F728EA6B03E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:x86:*",
|
|
"matchCriteriaId": "359108EA-33F3-4F02-A069-C45399CB2EB3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:lync_room_system:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EA1A9222-FA8D-419A-8DEF-7F74D601D85E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:skype_for_business:2016:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D499807D-91F3-447D-B9F0-D612898C9339"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1034126",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1034127",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-123",
|
|
"source": "secure@microsoft.com"
|
|
}
|
|
]
|
|
} |