René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

103 lines
2.6 KiB
JSON

{
"id": "CVE-2005-4644",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-12-31T05:00:00.000",
"lastModified": "2017-07-20T01:29:21.113",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:edgewall_software:trac:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AF72084-56B5-4E1B-B701-887984789068"
}
]
}
]
}
],
"references": [
{
"url": "http://projects.edgewall.com/trac/ticket/2473",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://trac.edgewall.org/ticket/2473",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2006/dsa-951",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/16198",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/0226",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183",
"source": "cve@mitre.org"
}
]
}