mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
125 lines
4.0 KiB
JSON
125 lines
4.0 KiB
JSON
{
|
|
"id": "CVE-2011-0770",
|
|
"sourceIdentifier": "cret@cert.org",
|
|
"published": "2011-07-19T20:55:00.897",
|
|
"lastModified": "2017-08-17T01:33:44.040",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in Windows Event Log SmartConnector in HP ArcSight Connector Appliance before 6.1 allows remote attackers to inject arbitrary web script or HTML via the Windows XP variable in a file."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Windows Event Log SmartConnector de HP ArcSight Connector Appliance en versiones anteriores a la 6.1. Permite a usuarios remotos inyectar codigo de script web o c\u00f3digo HTML de su elecci\u00f3n a trav\u00e9s de la variable \"Windows XP\" en un fichero."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:windows_event_log_smartconnector:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "6.0.0.60023.2",
|
|
"matchCriteriaId": "3D8340CA-3B24-4711-B85A-38F73F0DB5A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:arcsight_c1000_appliance:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2ED4F23-4DDE-4D2A-932D-83FD93E86CCD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:arcsight_c1300_appliance:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3D9DFBB3-7E4A-40EC-8943-5D6D9489DE42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:arcsight_c3200_appliance:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "53379096-4B4E-4F86-8BE8-DAA902F4D5F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:arcsight_c3400_appliance:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7FB0EE4D-5E80-4625-893B-5C53E692337F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:arcsight_c5200_appliance:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9865427-52CA-4B0F-AFDE-EAE9C46D0AAA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:arcsight_c5400_appliance:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D02D9B67-9E0A-4B2A-A880-09DCA9622E85"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securitytracker.com/id?1025791",
|
|
"source": "cret@cert.org"
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/122054",
|
|
"source": "cret@cert.org",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/48694",
|
|
"source": "cret@cert.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68569",
|
|
"source": "cret@cert.org"
|
|
}
|
|
]
|
|
} |