Show plain JSON{"id": "CVE-2004-2031", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2004-05-21T04:00:00.000", "references": [{"url": "http://marc.info/?l=bugtraq&m=108541119526279&w=2", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/11696", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/6410", "tags": ["Exploit", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/10405", "tags": ["Exploit", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16241", "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=108541119526279&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/11696", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/6410", "tags": ["Exploit", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/10405", "tags": ["Exploit", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16241", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in user.php in e107 allows remote attackers to inject arbitrary web script or HTML via the (1) URL, (2) MSN, or (3) AIM fields."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:e107:e107:0.545:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DDD8B3B-8580-4624-8D77-E3FD97DFF4A6"}, {"criteria": "cpe:2.3:a:e107:e107:0.554:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6454D949-83A2-4F69-92E1-BBCD84F21BC2"}, {"criteria": "cpe:2.3:a:e107:e107:0.555_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC274184-AD8E-4BC2-BC6A-4E64F354BFFD"}, {"criteria": "cpe:2.3:a:e107:e107:0.603:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8692341-8DF2-4943-853A-4AAF1F313914"}, {"criteria": "cpe:2.3:a:e107:e107:0.610:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04C91C45-9A96-4E69-8A0A-D619AB45BC08"}, {"criteria": "cpe:2.3:a:e107:e107:0.611:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F7C68F4-9ECD-41A9-B4AE-48F028841428"}, {"criteria": "cpe:2.3:a:e107:e107:0.612:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28B75E28-08DE-4CA2-A60B-FB2F61AEC5BA"}, {"criteria": "cpe:2.3:a:e107:e107:0.613:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9AA824A-CEE6-460B-A668-92FC3A822305"}, {"criteria": "cpe:2.3:a:e107:e107:0.614:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A51FBB3-42CE-40E1-A15D-ADDFBF8E203D"}, {"criteria": "cpe:2.3:a:e107:e107:0.615:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEAC1FD5-ECD1-480C-827E-F1AE8484C4EA"}, {"criteria": "cpe:2.3:a:e107:e107:0.615a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D17F613A-6BE1-4B45-8E40-8E44E0EEA756"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}