mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
340 lines
13 KiB
JSON
340 lines
13 KiB
JSON
{
|
|
"id": "CVE-2013-5320",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2013-08-20T14:55:47.140",
|
|
"lastModified": "2024-11-21T01:57:18.533",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in Forums/EditPost.aspx in mojoPortal before 2.3.9.8 allows remote attackers to inject arbitrary web script or HTML via the txtSubject parameter."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de XSS en Forums/EditPost.aspx en mojoPortal anterior a 2.3.9.8, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarias a trav\u00e9s del par\u00e1metro \"txtSubject\"."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"baseScore": 4.3,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.3.9.7",
|
|
"matchCriteriaId": "CCC0798D-E8DD-4343-B0F2-F339E2955BF9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E59C176F-D536-4810-A355-52DF391B3952"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "968DE841-0BFC-4AEF-80CE-93BE0EBBEA3F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "89619B01-0E71-4BBE-8CFD-8CF3F3214528"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CB6AF073-AE44-4C2D-B4A5-38AB62B1A284"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A399E2DF-C72A-4971-99A5-927227637B9B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "403D4511-8936-499B-9140-FC4E909BED11"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "31413CC1-0CE7-42D4-B663-0212DD3E13BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7D0DC30B-7E08-4D0F-BA05-53B9CE0C1E08"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F1FCBFD0-FF17-453F-A580-9384CDA71386"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.2.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8841C42A-A547-40C2-B53C-B7D60229788E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E8509CAE-5AFA-42A2-8BDC-3A60E30974CC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FAFAC7F-F11B-4C88-8592-EC09735082FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.3.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4A282F26-EACD-49AB-B105-C85108D131B4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.3.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E04A7D4B-1983-4161-BC1F-CBF1BE573278"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "53AF046B-781A-4ADA-AD54-2C39E107B340"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4CEF6265-F3B8-4A82-9A01-81A762FBA6B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5A0CE2D5-25D7-4E9A-95EF-CC48FE3ADC6C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E953FBF-441E-49ED-94F6-688A13479416"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F4EED09D-34E7-4A3B-BA03-C614A2C70E52"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "912A2719-C5F9-4FA5-B269-907F55114442"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2128BA9A-A23A-432C-9C5A-B684F119C400"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78DF57FD-EF83-4BE3-9DC4-BA52B7D3417A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FCFE3632-5E17-49A6-B4A2-D446146425B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "038DDB13-CA10-40ED-8A1C-BCDC21172478"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04E35D3B-D0A5-49A0-B133-D55932411CE1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F32F9F6-1B5B-45A8-B7FC-DA27A29BD982"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CDDE77F8-7C3F-4EA1-BCE3-0C3365632E7D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8BD63DC8-26B6-49FB-94F2-E881471949F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07499CF0-A5EA-497A-B95F-5D019AD162E3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "981A020A-6B07-457B-A308-3136E1DE7007"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.7.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A8E68E4-B89C-4162-8B68-E5666B670F1E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.7.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8C45590B-C69F-452D-8F87-47D3AD8252F1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.8.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CD357348-E0AE-40BF-9DA0-F26463B6741F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.8.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D0462C81-8CA8-4953-B5B6-EDB2A0EAAD5E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "837CB0AC-2A72-4C09-B00D-D673404AA39D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CD829F60-4C1A-49EA-9E2C-8F7FC0005E88"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "472BFC3B-283C-4E5D-BC4D-7C03DD6F9AF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7AAE8C9F-ED1E-46DC-9592-D2AA912D9BC6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A0A0562C-F8EE-4F0A-A8CA-E779C240F454"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0200.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/95847",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/122608/MojoPortal-2.3.9.7-Cross-Site-Scripting.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/54297",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/61520",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86058",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.mojoportal.com/mojoportal-2398-released",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0200.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/95847",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/122608/MojoPortal-2.3.9.7-Cross-Site-Scripting.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/54297",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/61520",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86058",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://www.mojoportal.com/mojoportal-2398-released",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |