René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

139 lines
4.6 KiB
JSON

{
"id": "CVE-2007-2119",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-04-18T18:19:00.000",
"lastModified": "2018-10-16T16:42:10.490",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in boundary_rules.jsp in the Administration Front End for Oracle Enterprise (Ultra) Search, as used in Database Server 9.2.0.8, 10.1.0.5, and 10.2.0.2, and in Application Server 9.0.4.3, 10.1.2.0.2, and 10.1.2.2.0 allows remote attackers to inject arbitrary HTML or web script via the EXPTYPE parameter, aka SES01."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en boundary_rules.jsp en el Administration Front End para Oracle Enterprise (Ultra) Search, utilizado en Database Server 9.2.0.8, 10.1.0.5, y 10.2.0.2, y en Application Server 9.0.4.3, 10.1.2.0.2, y 10.1.2.2.0 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro EXTYPE, tambi\u00e9n conocido como SES01."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_server:9.0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9CA9867F-D7BC-4230-9584-C2FBB6642482"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B4BAA9-D045-4D2B-8220-47F47ED936DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0223F3-A9D4-4A4F-8934-761D83CD5494"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:database_server:9.2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "432A3020-9977-4A10-9CDA-3A71E83F63F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "03A522A3-07D7-481F-A538-EA3D13256F63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:database_server:10.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "67FF2A2E-3693-424E-B53D-0BAD01D53F7A"
}
]
}
]
}
],
"references": [
{
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2007-090632.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.red-database-security.com/advisory/oracle_cpu_apr_2007.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.red-database-security.com/advisory/oracle_css_ses.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/466156/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/466329/100/200/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/23532",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1017927",
"source": "cve@mitre.org"
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA07-108A.html",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/1426",
"source": "cve@mitre.org"
}
]
}