Show plain JSON{"id": "CVE-2010-0363", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.6, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "HIGH", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 4.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2010-01-20T16:30:00.633", "references": [{"url": "http://support.zeus.com/zws/media/docs/4.3/RELEASE_NOTES", "source": "cve@mitre.org"}, {"url": "http://support.zeus.com/zws/media/docs/4.3/RELEASE_NOTES", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Zeus Web Server before 4.3r5, when SSL is enabled for the admin server, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2002-1785."}, {"lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Zeus Web Server en versiones anteriores a v4.3r5, cuanel SSL esta activado para el administrador del servidor, permite a atacantes remotos inyectar secuencias arbitrarias de comandos web o HTML a traves de vectores sin especificar, una vulnerabilidad diferente de CVE-2002-1785."}], "lastModified": "2024-11-21T01:12:03.693", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:zeus:zeus_web_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32CA2775-003D-40D2-A32E-B4370E961935", "versionEndIncluding": "4.3r4"}, {"criteria": "cpe:2.3:a:zeus:zeus_web_server:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF3C0DD2-15F8-4A76-BB8E-42988AA5751D"}, {"criteria": "cpe:2.3:a:zeus:zeus_web_server:3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA8AE81E-74A4-4745-BB16-688B2F7B77E2"}, {"criteria": "cpe:2.3:a:zeus:zeus_web_server:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9074BFE9-176E-43B7-AEC2-EE83A8AE0921"}, {"criteria": "cpe:2.3:a:zeus:zeus_web_server:4.1r1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAC18555-FACF-41B4-B976-C01526DF6233"}, {"criteria": "cpe:2.3:a:zeus:zeus_web_server:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC5B7188-066F-44B3-ADAF-AA937023A3DE"}, {"criteria": "cpe:2.3:a:zeus:zeus_web_server:4.2r2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F485196B-3E43-4D13-8E33-6579E9BC50BC"}, {"criteria": "cpe:2.3:a:zeus:zeus_web_server:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB434DD5-A283-4540-B5BD-55778D644696"}, {"criteria": "cpe:2.3:a:zeus:zeus_web_server:4.3r3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0963ABB-06D3-46AC-8E80-481B7A2C6CFB"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}