mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
126 lines
3.9 KiB
JSON
126 lines
3.9 KiB
JSON
{
|
|
"id": "CVE-2008-2825",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-06-23T17:41:00.000",
|
|
"lastModified": "2017-08-08T01:31:21.373",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the embedded Web Server in Xerox WorkCentre M123, M128, and 133 and WorkCentre Pro 123, 128, and 133 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados en el servidor web embebido en Xerox WorkCentre M123, M128, y 133 y WorkCentre Pro 123, 128, y 133, permite a atacantes remotos inyectar secuencias de comansdos web y HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:workcentre:m123:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3810671F-9985-49E1-8706-8439BDE51DCD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:workcentre:m123:unknown:pro:*:*:*:*:*",
|
|
"matchCriteriaId": "E6A007EB-D8A0-4391-9C38-CEA878C3C1B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:workcentre:m128:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80270025-8B0E-451B-ACAA-DD30CA8C25AE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:workcentre:m128:unknown:pro:*:*:*:*:*",
|
|
"matchCriteriaId": "7687A27D-54A7-4B68-BE83-A0C077882F33"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:workcentre:m133:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "32EFB35D-ED35-4F19-A593-F555DB2D3637"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:workcentre:m133:unknown:pro:*:*:*:*:*",
|
|
"matchCriteriaId": "624A67F3-8EF4-4BEB-A8D2-3942EBF1FA34"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/29689",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1020280",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/1830/references",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_005.pdf",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43061",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |