Show plain JSON{"id": "CVE-2010-1724", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2010-05-06T14:53:01.420", "references": [{"url": "http://community.zikula.org/index.php?module=News&func=display&sid=3012&title=zikula-1.2.3-release-announcement", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://osvdb.org/64096", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/39614", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.htbridge.ch/advisory/xss_vulnerability_in_zikula_application_framework.html", "source": "cve@mitre.org"}, {"url": "http://www.htbridge.ch/advisory/xss_vulnerability_in_zikula_application_framework_1.html", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/64095", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/510988/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/39717", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58224", "source": "cve@mitre.org"}, {"url": "http://community.zikula.org/index.php?module=News&func=display&sid=3012&title=zikula-1.2.3-release-announcement", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/64096", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/39614", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.htbridge.ch/advisory/xss_vulnerability_in_zikula_application_framework.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.htbridge.ch/advisory/xss_vulnerability_in_zikula_application_framework_1.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/64095", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/510988/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/39717", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58224", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Zikula Application Framework 1.2.2, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) func parameter to index.php, or the (2) lang parameter to index.php, which is not properly handled by ZLanguage.php."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Zikula Application Framework versi\u00f3n v1.2.2 y anteriores permiten a atacantes remotos inyectar c\u00f3digo web o HTML de su elecci\u00f3n usando el par\u00e1metro (1) func o el par\u00e1metro (2) en index.php, que no es manejado adecuadamente por ZLanguage.php."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:zikula:zikula_application_framework:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A76E5B1A-8CD3-40E6-B491-81F7D8B8F86A"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}