2024-12-08 03:06:42 +00:00

158 lines
4.5 KiB
JSON

{
"id": "CVE-2010-0971",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-03-16T19:00:00.680",
"lastModified": "2024-11-21T01:13:19.570",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in ATutor 1.6.4 allow remote authenticated users, with Instructor privileges, to inject arbitrary web script or HTML via the (1) Question and (2) Choice fields in tools/polls/add.php, the (3) Type and (4) Title fields in tools/groups/create_manual.php, and the (5) Title field in assignments/add_assignment.php. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en ATutor v1.6.4 permite a usuarios autentificados remotamente, con privilegios de Instructor, inyectar c\u00f3digo web o HTML de su elecci\u00f3n a trav\u00e9s de los campos (1) Question y(2) Choice en tools/polls/add.php, los campos(3) Type y (4) Title en tools/groups/create_manual.php; y el campo (5) Title en assignments/add_assignment.php"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N",
"baseScore": 2.1,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atutor:atutor:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD19A48-FC2A-406C-8299-60E87269451F"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/62904",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/62905",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/62906",
"source": "cve@mitre.org"
},
{
"url": "http://packetstormsecurity.org/1003-exploits/atutor-xss.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/38906",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/11685",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/38656",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56852",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/62904",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://osvdb.org/62905",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://osvdb.org/62906",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://packetstormsecurity.org/1003-exploits/atutor-xss.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/38906",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/11685",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/38656",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56852",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}