mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
241 lines
8.5 KiB
JSON
241 lines
8.5 KiB
JSON
{
|
|
"id": "CVE-2007-0308",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-01-18T00:28:00.000",
|
|
"lastModified": "2008-11-15T06:39:49.140",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in Plain Black WebGUI before 7.3.4 (beta) allows remote attackers to inject arbitrary web script or HTML via Wiki Page titles."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Plain Black WebGUI anterior a 7.3.4 (beta) permite a atacantes remotos la inyecci\u00f3n de secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de los t\u00edtulos de las P\u00e1ginas Wiki."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6E92144A-C66C-4959-B06A-39283EE43915"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "607C1B59-8C27-48D1-B4F2-8C7CCA293E32"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "41B536B2-0C3E-4A9B-B6C7-F3DAA8F4119D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "796E640B-D3EF-4BB9-8521-62BDA198E013"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3F10FF6A-509A-4729-A104-35CE16D16E50"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB3B80DB-6431-439B-B5FF-6DD8E3C04248"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.5.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EADCABBD-1745-4D0F-8347-C2EA8EC41DC0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.5.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B9C1892F-716B-46D2-B74D-ACE9BB87E709"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.5.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD6D9E39-EE7C-4D2F-BC92-6A23F3C65629"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F6C4F60-45AF-4888-BC79-229943953D9D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.6.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AC90D92C-9028-430C-BCA5-E16EA69524F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.6.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6EEEF194-0EA2-4560-8CD9-02606183A663"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.6.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D30D285D-F51C-4B1D-8AEE-00984C23C6D3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.6.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F23DB394-9885-4505-89DB-03C92302958C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.6.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BEB72220-4AA2-4C30-B934-BBC0F72869C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BA8972F3-4AEA-4572-9177-9E3D9A34BB18"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C6933824-00C3-4F0F-A705-83A8DFB7667D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "58471E98-F111-4119-8C94-F978823ADFD1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.7.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BBD6A204-D86F-4021-AD9F-EB49CC597200"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.7.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "58CEFD97-46E8-4E27-854C-21FE07816595"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.7.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0295B68E-4F07-44BD-B3FF-9E73870B1AE9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.7.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7EFA45FB-9D9B-4650-9E0D-05D5724F4D27"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.8.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "33B89220-6D56-40FB-91C3-4DD577782450"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.8.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "37630BCF-3A37-423D-B3C9-D18D0EC9B0A0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.8.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "49D7B4DD-0229-4A59-92F0-558F8A01E6B4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.8.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AF167C13-6F70-434C-856B-C9BCC7050591"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.8.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B482A364-8AB2-4517-8BAB-3C96E7F8659B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:6.8.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F4167165-DD1D-4961-BBEF-DF8DFBE89D69"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:plain_black:webgui:7.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D8A7A04F-648A-46AB-9FC0-CF43B00F1AB3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://osvdb.org/32813",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/23718",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.plainblack.com/getwebgui/advisories/webgui-7_3_4-beta-released#BUeIjcWiQasypsJxD-YwgQ",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/22051",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
}
|
|
]
|
|
} |