mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
202 lines
6.7 KiB
JSON
202 lines
6.7 KiB
JSON
{
|
|
"id": "CVE-2008-0940",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-02-25T20:44:00.000",
|
|
"lastModified": "2024-11-21T00:43:16.457",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in Plain Black WebGUI before 7.4.24 allows remote attackers to inject arbitrary web script or HTML when creating a username, a different vulnerability than CVE-2007-0407."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Plain Black WebGUI antes de 7.4.24 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n cuando se crea un nombre de usuario, una vulnerabilidad distinta a CVE-2007-0407."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"baseScore": 4.3,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F9C9099E-5BF3-432E-8F8C-0E30E6E88B39"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2697D591-553B-4183-B890-98A1C3FDE80F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2228E124-980F-4AF6-B7C5-7173B921487B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "371C0312-D203-4E7D-9A36-57770222E459"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87A79FC3-A1AB-4F04-9D00-97801A5183D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C79D2667-ED6E-457A-B1AF-69B8D027F0AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6DACB4C4-8F7C-476B-B6C3-70C85B2CE8F7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "415DEEE6-1F80-43EB-9C4D-F215A4475B8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7D6747BF-11E1-41BD-A73E-9151740CA6E9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D61CFDF7-8438-4201-A53D-7CDD7CEC7A50"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E44D6BD-50D7-4A90-9C5F-647FA31F4C9D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB48AEDC-1F37-4CEE-98AC-1D0509FC00CA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C2FEC347-08CC-4C60-94AB-23A3CE1971CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3A9A1984-91C9-4A57-88DD-673AE49C1250"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7262F96B-A760-45EA-AD88-CF7E42D0085F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "49227629-92BD-49A1-9C51-90DF0B40365C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2363AA20-0467-414E-B7A1-64F6B9867B06"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB553BEA-4120-431D-A946-F990C931E102"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:webgui:webgui:7.4.23:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9AA5199D-E38A-4114-A2C5-B8AC5A9DDB9D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://secunia.com/advisories/28967",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.plainblack.com/getwebgui/advisories/webgui-7_4_24-stable-released",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/27869",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/28967",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.plainblack.com/getwebgui/advisories/webgui-7_4_24-stable-released",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/27869",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
}
|
|
]
|
|
} |