Show plain JSON{"id": "CVE-2010-1137", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2010-04-01T19:30:00.627", "references": [{"url": "http://lists.vmware.com/pipermail/security-announce/2010/000086.html", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/39037", "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id?1023769", "source": "cve@mitre.org"}, {"url": "http://www.vmware.com/security/advisories/VMSA-2010-0005.html", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6863", "source": "cve@mitre.org"}, {"url": "http://lists.vmware.com/pipermail/security-announce/2010/000086.html", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/39037", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1023769", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vmware.com/security/advisories/VMSA-2010-0005.html", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6863", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in WebAccess in VMware VirtualCenter 2.0.2 and 2.5 and VMware ESX 3.0.3 and 3.5, and the Server Console in VMware Server 1.0, allows remote attackers to inject arbitrary web script or HTML via the name of a virtual machine."}, {"lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en WebAccess in VMware VirtualCenter 2.0.2 y 2.5 y en VMware ESX 3.0.3 y 3.5 y en Server Console en VMware Server 1.0, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante el nombre de una m\u00e1quina virtual."}], "lastModified": "2024-11-21T01:13:43.787", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:vmware:virtualcenter:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDFF5385-64AA-48AD-A5FE-25918E4F07D6"}, {"criteria": "cpe:2.3:a:vmware:virtualcenter:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D17E8DFD-AC99-45E6-81F9-ED66369FBD0A"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73EC33AB-E92A-4AA8-A523-C341133BB515"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:vmware:esx_server:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C69FB3ED-9E8B-47A7-A326-1CE03B0EB62B"}, {"criteria": "cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16EFF4E2-CA32-4FA4-AC4B-82D8C50769D9"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}