mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
244 lines
8.5 KiB
JSON
244 lines
8.5 KiB
JSON
{
|
|
"id": "CVE-2010-2428",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2010-06-24T12:17:45.203",
|
|
"lastModified": "2017-08-17T01:32:43.430",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in admin_loginok.html in the Administrator web interface in Wing FTP Server for Windows 3.5.0 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted POST request."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la interfaz de administrador web en Wing FTP Server para Windows v3.5.0 y anteriores permite a atacantes remotos inyecatr c\u00f3digo web o HTML a trav\u00e9s de peticiones POST manipuladas."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.5.0",
|
|
"matchCriteriaId": "BD7852F2-6DF0-4631-93AA-CE3BBE03161C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DE985A97-2D41-47DE-A805-7A2FD285165C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A4A607B9-05E9-4AAF-8B7E-A5F55AE5F834"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34B8CF5F-0149-44EC-9B35-867FFEB15144"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B854DF1-FA49-4015-869C-1A9DBB3452BC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9678635A-4445-469D-91C0-9519FCEA33D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D801B327-DB9F-431C-92E2-F79E18904029"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F1798A19-E60D-47B4-A2EC-0BCC055F0E16"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F04AC1A2-2DD0-4830-A0A5-30E8A3D4E489"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AAD763A5-2FB7-4062-9F7A-D6774052A197"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "756C96B8-1848-4E56-8CF8-B991DE039651"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:3.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7BE25EE-95B5-41E1-A44E-ADDD38AD6F95"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:3.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9CDA234C-1233-4534-9564-7AAB96F90FD8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:3.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C3AFD7C3-B6CA-43F2-88B7-C2E6A2725FD3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:3.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6538A214-F187-4F3E-8493-AB22F97E5BB3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:3.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D144A158-72F1-4A10-9E53-3CB9D50F9ECF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:3.2.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8F24AE53-EB21-4148-ABA5-87A247404966"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:3.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3D865E06-5BE1-4F8D-BD38-75C0B4550A28"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:3.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F9AD9989-210A-4C91-A2E6-3F597A6F2DA9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:3.3.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "654DC106-855A-4615-99EC-5DB7D5A34480"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:3.4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "488217F9-1CBB-4FEA-9882-EFF98954589E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:3.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE722782-516C-4526-8F81-5CA599B445A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:3.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D8B0ED05-DE40-470A-B567-5B9C78CD469E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:3.4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "401056BD-21D4-41A8-80AD-70F77C4CFE07"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wftpserver:wing_ftp_server:3.4.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0316B82B-B023-4617-B46E-EB691DCDE0CD"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2010-06/0031.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://labs-werew01f.sectester.net/2010/06/wing-ftp-server-cross-site-scripting.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2010/Jun/128",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2010/Jun/49",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/40510",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59094",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |