mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
120 lines
3.7 KiB
JSON
120 lines
3.7 KiB
JSON
{
|
|
"id": "CVE-2006-1645",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-04-06T10:04:00.000",
|
|
"lastModified": "2018-10-18T16:33:43.843",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in Anton Vlasov and Rostislav Gaitkuloff ReloadCMS 1.2.5 and earlier allows remote attackers to inject arbitrary web script or HTML and gain leverage to execute arbitrary PHP code via the User-Agent HTTP header, which is displayed by admin/modules/general/statistic.php in the administration panel."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reloadcms:reloadcms:1.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "43EF4EC4-D6D7-4361-AE23-EE17675A72F7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reloadcms:reloadcms:1.2.0_p1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "53A2649E-3040-4FA6-8F15-ACF0B73BB39B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reloadcms:reloadcms:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3BCF1319-416C-447F-8AED-FD9C6740722C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reloadcms:reloadcms:1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F25D41F-1C54-4995-BD4C-F0669B2AF6DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reloadcms:reloadcms:1.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8C95699C-4908-4AAF-A25F-D4E3EE78220F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reloadcms:reloadcms:1.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4220CA1D-AAD2-4F74-9DAB-01108DDD2B56"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reloadcms:reloadcms:1.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BA12FC6D-44E4-40B2-A368-DD3407A1C430"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/429666/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/17353",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/1193",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25604",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |