René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

117 lines
3.7 KiB
JSON

{
"id": "CVE-2006-6158",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-11-28T23:28:00.000",
"lastModified": "2018-10-17T21:46:59.877",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in (a) PMOS Help Desk 2.4, formerly (b) InverseFlow Help Desk 2.31 and also sold as (c) Ace Helpdesk 2.31, allow remote attackers to inject arbitrary web script or HTML via the (1) id or email parameter to ticketview.php, or (2) the email parameter to ticket.php."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en (a) PMOS Help Desk 2.4, antiguamente (b) InverseFlow Help Desk 2.31 y tambi\u00e9n vendido como (c) Ace Helpdesk 2.31, permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante los par\u00e1metros (1) email o id a ticketview.php, o el (2) par\u00e1metro email a ticket.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ace_helpdesk:ace_helpdesk:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1C067839-F034-4F42-806F-0853111119EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:inverseflow:help_desk:2.31:*:*:*:*:*:*:*",
"matchCriteriaId": "3F7E62BB-2848-47BE-A7A9-15B629D272AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pmos_helpdesk:pmos_helpdesk:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEE7928-7568-4637-8297-B1F285AEBCD7"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/1928",
"source": "cve@mitre.org"
},
{
"url": "http://www.attrition.org/pipermail/vim/2006-November/001148.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/452397/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/21250",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/4670",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/4671",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/4672",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30489",
"source": "cve@mitre.org"
}
]
}