mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
129 lines
4.2 KiB
JSON
129 lines
4.2 KiB
JSON
{
|
|
"id": "CVE-2014-2125",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2014-04-02T03:58:17.090",
|
|
"lastModified": "2015-09-16T19:18:10.193",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the Web Inbox in Cisco Unity Connection 8.6(2a)SU3 and earlier allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCui33028."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de XSS en Web Inbox de Cisco Unity Connection 8.6(2a)SU3 y anteriores permite a atacantes remotos inyectar script Web o HTML arbitrarios a trav\u00e9s de un par\u00e1metro no especificado, tambi\u00e9n conocido como Bug ID CSCui33028."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:*:\\(2a\\)su3:*:*:*:*:*:*",
|
|
"versionEndIncluding": "8.6",
|
|
"matchCriteriaId": "52D449F3-D3EF-4711-B5B1-0E6DC17ED20C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "62C504A3-5B4C-4230-97A9-B3CCDA0CBD31"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6:\\(1\\):*:*:*:*:*:*",
|
|
"matchCriteriaId": "3285A9DA-81A3-4E57-93E6-BCC54FFE3661"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6:\\(2\\):*:*:*:*:*:*",
|
|
"matchCriteriaId": "D3E5E101-6E83-492D-8034-FF435BB92B5E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6:\\(2a\\)su1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "53861756-06E5-42EF-8E6F-06C21AB92313"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6:\\(2a\\)su2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB4C6D85-B322-4C4B-8B4D-6BB2A433A09A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(1a\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C40F61A6-A992-4DA4-9730-D145055596C2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "632B8CDD-5ACC-4FFB-950B-480CC43D192D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2125",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33603",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1029988",
|
|
"source": "ykramarz@cisco.com"
|
|
}
|
|
]
|
|
} |