mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
179 lines
6.3 KiB
JSON
179 lines
6.3 KiB
JSON
{
|
|
"id": "CVE-2007-3120",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-06-07T21:30:00.000",
|
|
"lastModified": "2017-07-29T01:31:59.503",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in public/code/cp_dpage.php in All In One Control Panel (AIOCP) before 1.3.017 allows remote attackers to inject arbitrary web script or HTML via the aiocp_dp parameter. NOTE: some of these details are obtained from third party information."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el public/code/cp_dpage.php del Panel de Control Todo en Uno (AIOCP) anterior a la versi\u00f3n 1.3.017 permite a atacantes remotos la inyecci\u00f3n de secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s del par\u00e1metro aiocp_dp. NOTA: alguno de estos detalles se obtienen a partir de la informaci\u00f3n de terceros."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.000:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7D4D34B-5856-449E-B146-0414B01E357B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.001:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9CBBE828-3E9C-4267-B315-DD57054F1450"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.002:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA2A2CE9-4A2F-40F4-81D7-B090900129FE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.003:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "389615A9-6D11-4555-98FE-B4969DECF50C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.004:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "63B0794D-0766-4A11-9613-1568E3A20446"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.005:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BCBD2F9E-97C0-456B-8475-862241DF437D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.006:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "06C22893-1E2F-48B2-B571-358145734B8F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.007:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DAB6E40E-8937-4563-BB67-C9212A2652D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.008:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C17D7552-E576-4610-A467-D2B888AD9524"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.009:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E769403-BDCA-4E06-AE3C-1E3A6A65C282"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.010:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5C4EF48A-DFFC-4963-AE03-51E4C8535EC9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.011:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "67031BC7-1EAC-43BF-B663-5EB2A2EB195D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.012:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44852920-C008-40C8-8895-F5DCEF35983F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.013:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F125B9B9-1F1C-4ED7-8CE3-236684A8F7CA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.014:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FE8B7B59-5615-429D-B207-E77F590EBC28"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.015:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4057D785-E940-486C-8A58-7C47E156B63B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.016:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C337D33C-C471-4101-AAC8-4A54166BA5FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aiocp:aiocp:1.3.017:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "15C6BE95-7B79-4F61-9A61-E2135FAA0FC6"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=514035",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/24357",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/2097",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34762",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |