2024-12-08 03:06:42 +00:00

171 lines
4.3 KiB
JSON

{
"id": "CVE-2004-1716",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-08-16T04:00:00.000",
"lastModified": "2024-11-20T23:51:34.277",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in PForum before 1.26 allows remote attackers to inject arbitrary web script or HTML via the (1) IRC Server or (2) AIM ID fields in the user profile."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:powie:pforum:1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "482C52B4-A029-4D00-8CA6-1D3225D8DE8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:powie:pforum:1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "BC0DC717-9742-4852-9582-8E4EF0C361DD"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=109267937212298&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/12317/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/674542",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.osvdb.org/8985",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.pscript.de/news/index.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/10954",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17003",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=109267937212298&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/12317/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/674542",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.osvdb.org/8985",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.pscript.de/news/index.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/10954",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17003",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}