Show plain JSON{"id": "CVE-2008-4903", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2008-11-04T00:58:40.180", "references": [{"url": "http://secunia.com/advisories/32272", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/4550", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/497970", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/31993", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46204", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/32272", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/4550", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/497970", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/31993", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46204", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the leave comment (feedback) feature in Typo 5.1.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) comment[author] (Name) and (2) comment[url] (Website) parameters."}, {"lang": "es", "value": "Una vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados en la funcionalidad \"dejar comentario\" (feedback) en Typo 5.1.3 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de los par\u00e1metros (1) comentario [autor] (Nombre) y (2) comentario [url] (Website)."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:typosphere:typo:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E3019EC-DA80-4761-B832-964F6EF93A65", "versionEndIncluding": "5.1.3"}, {"criteria": "cpe:2.3:a:typosphere:typo:1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AB16906-D886-490E-B677-96E498869033"}, {"criteria": "cpe:2.3:a:typosphere:typo:1.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA278206-6FE9-47B0-A2C5-29DB5FBA209D"}, {"criteria": "cpe:2.3:a:typosphere:typo:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B47D305A-E52B-487C-A224-A877B88153F7"}, {"criteria": "cpe:2.3:a:typosphere:typo:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CF012B6-1435-4030-AD9A-62DB01DE0662"}, {"criteria": "cpe:2.3:a:typosphere:typo:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11CBA97F-C726-4C89-8669-3B54A20910B2"}, {"criteria": "cpe:2.3:a:typosphere:typo:2.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF0A64C3-BE11-4876-9080-9F48BE9FB1D6"}, {"criteria": "cpe:2.3:a:typosphere:typo:2.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36A454B2-25F5-4D11-BB6F-8E3B59FFB0FF"}, {"criteria": "cpe:2.3:a:typosphere:typo:2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DAD9ECE7-068C-45A7-9E84-5F39C16EC163"}, {"criteria": "cpe:2.3:a:typosphere:typo:2.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCF5981C-6983-46E3-92E5-8AD5732CAF5A"}, {"criteria": "cpe:2.3:a:typosphere:typo:2.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "829B4A24-B296-4998-9660-DFCCC84B5737"}, {"criteria": "cpe:2.3:a:typosphere:typo:2.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55B3F7BE-6A7F-4DF6-A8A5-255C80AC5394"}, {"criteria": "cpe:2.3:a:typosphere:typo:2.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CACF067-89CB-4E95-9765-F440065DDDE4"}, {"criteria": "cpe:2.3:a:typosphere:typo:2.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57BB7A8C-1F33-488A-AF97-422105AB1CF7"}, {"criteria": "cpe:2.3:a:typosphere:typo:2.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C43C4381-76D1-4E4D-929D-57CF7985268E"}, {"criteria": "cpe:2.3:a:typosphere:typo:2.5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2169F77-8CDF-494F-8A5B-FBFA423F508A"}, {"criteria": "cpe:2.3:a:typosphere:typo:2.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F311CEC8-F619-4F79-A434-6BCB8505F1F3"}, {"criteria": "cpe:2.3:a:typosphere:typo:3.99.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9C58BA0-8E59-43BF-9558-E050C29AF181"}, {"criteria": "cpe:2.3:a:typosphere:typo:3.99.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10174180-CBD7-4481-A067-EB3CEA93A362"}, {"criteria": "cpe:2.3:a:typosphere:typo:3.99.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96B6FF23-B700-4B0D-8FA5-1CDED4E9A54F"}, {"criteria": "cpe:2.3:a:typosphere:typo:3.99.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2A09B06-DF95-4112-9FC8-847BDBCAEBFD"}, {"criteria": "cpe:2.3:a:typosphere:typo:3.99.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF324FFC-353B-47C2-809E-1AF1003DBD6B"}, {"criteria": "cpe:2.3:a:typosphere:typo:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "634E850B-5C36-497C-9175-FBA1F5FF4C1A"}, {"criteria": "cpe:2.3:a:typosphere:typo:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A845374-834E-4696-A9C2-A32C83044CBF"}, {"criteria": "cpe:2.3:a:typosphere:typo:5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37FBAA0E-8E1D-4E8B-A08D-AA477FEDA85D"}, {"criteria": "cpe:2.3:a:typosphere:typo:5.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D419017-2B6C-4DF9-8B98-F74840721BED"}, {"criteria": "cpe:2.3:a:typosphere:typo:5.0.3.98:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "028B2D4F-8BB6-4DB9-A1A3-3BB88407639E"}, {"criteria": "cpe:2.3:a:typosphere:typo:5.0.3.98.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FD1F53D-1911-445A-8230-748F2DD20621"}, {"criteria": "cpe:2.3:a:typosphere:typo:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF128B29-BFF1-4E99-A1B4-999C14FDB3AE"}, {"criteria": "cpe:2.3:a:typosphere:typo:5.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4225B42A-48BF-4AD3-ACB7-4806EA785B1E"}, {"criteria": "cpe:2.3:a:typosphere:typo:5.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "447033D5-7C0E-4184-AF79-E1CB31BD6AE2"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}