René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

91 lines
2.5 KiB
JSON

{
"id": "CVE-2015-3384",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-04-21T18:59:06.717",
"lastModified": "2016-12-06T03:00:39.313",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Bank Account Listing Page in the Commerce Balanced Payments module for Drupal allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de XSS en Bank Account Listing Page en el m\u00f3dulo Commerce Balanced Payments para Drupal permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTMl arbitrarios o HTML a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:commerce_balanced_payments_project:commerce_balanced_payments:7.x-1.2:*:*:*:*:drupal:*:*",
"matchCriteriaId": "4DC3F9BF-C6F1-4E4E-8181-64987B599D2F"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2015/02/13/12",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/72615",
"source": "cve@mitre.org"
},
{
"url": "https://www.drupal.org/node/2424435",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}