Show plain JSON{"id": "CVE-2008-1250", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": true, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2008-03-10T17:44:00.000", "references": [{"url": "http://secunia.com/advisories/28938", "source": "cve@mitre.org"}, {"url": "http://www.gnucitizen.org/projects/router-hacking-challenge/", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/489009/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/27767", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40500", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/28938", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.gnucitizen.org/projects/router-hacking-challenge/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/489009/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/27767", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40500", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web interface on the central phone server for the Snom 320 SIP Phone allow remote attackers to perform actions as the phone user, as demonstrated by inserting an address-book entry containing an XSS sequence."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en el interfaz web del servidor central del tel\u00e9fono en Snom 320 SIP Phone, permiten a atacantes remotos realizar acciones como si fuesen el usuario del tel\u00e9fono, como se ha demostrado insertando una entrada en la libreta de direcciones que conten\u00eda una secuencia XSS."}], "lastModified": "2024-11-21T00:44:03.570", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:snom:320_sip_phone:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "756F9732-B2CC-4CB5-82A0-405A8FF0D67E"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}