mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
192 lines
6.5 KiB
JSON
192 lines
6.5 KiB
JSON
{
|
|
"id": "CVE-2010-0460",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2010-01-28T20:30:01.777",
|
|
"lastModified": "2024-11-21T01:12:15.893",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple cross-site scripting (XSS) vulnerabilities in staff/index.php in Kayako SupportSuite 3.60.04 and earlier allow remote authenticated users to inject arbitrary web script or HTML via the (1) subject parameter and (2) contents parameter (aka body) in an insertquestion action. NOTE: some of these details are obtained from third party information."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en staff/index.php en Kayako SupportSuite v3.60.04 y anteriores permite a usuarios remotos autenticados inyectar secuencias arbitrarias de comandos web o HTML a trav\u00e9s de los par\u00e1metros (1) \"subject\" y (2) \"contents\" (tambi\u00e9n conocido como \"body\") en una acci\u00f3n insertquestion. NOTA: La procedencia de esta informaci\u00f3n es desconocida, los detalles fueron obtenidos de informaci\u00f3n de terceros."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"baseScore": 3.5,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 6.8,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kayako:esupport:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.60.04",
|
|
"matchCriteriaId": "F648C9B1-D21E-4B1B-9F72-779B497D73C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kayako:supportsuite:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1FA8EFAF-3034-4546-94E5-31B2B3FE0E2A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kayako:supportsuite:3.00.26:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "306A4240-7895-4B3F-B8FC-91F76DAA4ADE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kayako:supportsuite:3.00.32:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DCCD5F81-495F-4433-86BD-2F2AA7696334"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kayako:supportsuite:3.10.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9C022D3-42ED-442E-9125-E0EAA8E74705"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kayako:supportsuite:3.10.02:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7FC5A1D5-8831-4032-92D8-DD490CC28774"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kayako:supportsuite:3.11.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "878901B9-06F2-49ED-A035-1BD86BB5F11D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kayako:supportsuite:3.11.01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F297ABB-E65C-4BBF-B846-AFCC5A572540"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kayako:supportsuite:3.20.02:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97A653BB-E814-4194-B911-CB3F6B69F5A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kayako:supportsuite:3.30:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68CB9C07-C2DC-4186-8B6E-5B902B6261D3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kayako:supportsuite:3.30:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "31270F05-C038-4C7D-9592-505FE936A993"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kayako:supportsuite:3.50.06:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "92135838-7596-42DD-B04A-B8ABFF790817"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://osvdb.org/61928",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://packetstormsecurity.org/1001-advisories/kayako-xss.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/38322",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/509122/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/37947",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55859",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/61928",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://packetstormsecurity.org/1001-advisories/kayako-xss.txt",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/38322",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/509122/100/0/threaded",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/37947",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55859",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |