Show plain JSON{"id": "CVE-2007-4104", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2007-07-31T10:17:00.000", "references": [{"url": "http://blogsecurity.net/news/news-130707/", "source": "cve@mitre.org"}, {"url": "http://blogsecurity.net/wordpress/news-260707/", "source": "cve@mitre.org"}, {"url": "http://bueltge.de/plugin-wp-feedstats-in-neuer-version/481/", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=full-disclosure&m=118548811323718&w=2", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://osvdb.org/37259", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/26249", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/25085", "tags": ["Exploit", "Patch"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35646", "source": "cve@mitre.org"}, {"url": "http://blogsecurity.net/news/news-130707/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://blogsecurity.net/wordpress/news-260707/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://bueltge.de/plugin-wp-feedstats-in-neuer-version/481/", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://marc.info/?l=full-disclosure&m=118548811323718&w=2", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/37259", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/26249", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/25085", "tags": ["Exploit", "Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35646", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the WP-FeedStats before 2.4 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, one of which involves an rss2 feed with an invalid or missing blog with an XSS sequence in the query string."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en la extensi\u00f3n WP-FeedStats anterior a 2.4 para WordPress permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados, uno de los cuales involucra una fuente rss2 con un blog inv\u00e1lido o ausente con una secuencia XSS en la cadena de b\u00fasqueda."}], "lastModified": "2024-11-21T00:34:47.587", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:wp-feedstats:wordpress_plugin:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80E09F20-0427-4706-89B4-CD0B1BD65859", "versionEndIncluding": "2.1"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}