2024-12-08 03:06:42 +00:00

123 lines
3.5 KiB
JSON

{
"id": "CVE-2010-2256",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-06-09T20:30:24.507",
"lastModified": "2024-11-21T01:16:15.277",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Pay Per Minute Video Chat Script 2.0 and 2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to admin/memberviewdetails.php and the (2) model parameter to videos.php."
},
{
"lang": "es",
"value": "Multiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Pay Per Minute Video Chat Script v2.0 y v2.1 permite a atacantese remotos ejecutar c\u00f3digo web y HTML de su elecci\u00f3n a trav\u00e9s del par\u00e1metro (1) id en admin/memberviewdetails.php y el par\u00e1metro (2) model en videos.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:payperviewvideosoftware:pay_per_minute_video_chat_script:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A002D4AF-705B-4BA8-B04F-83388F66C6C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:payperviewvideosoftware:pay_per_minute_video_chat_script:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EFCD0BD3-2712-4927-B666-6A99D224E636"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.org/1001-exploits/ppmvcs-sqlxss.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/38086",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/10983",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://packetstormsecurity.org/1001-exploits/ppmvcs-sqlxss.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/38086",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/10983",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}