Show plain JSON{"id": "CVE-2010-1996", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "HIGH", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2010-05-20T17:30:01.817", "references": [{"url": "http://holisticinfosec.org/content/view/141/45/", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/64552", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/64553", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/64554", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/39320", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/40108", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58475", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58491", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58492", "source": "cve@mitre.org"}, {"url": "http://holisticinfosec.org/content/view/141/45/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/64552", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/64553", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/64554", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/39320", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/40108", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58475", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58491", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58492", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in index.php in TomatoCMS before 2.0.5 allow remote authenticated users, with certain creation privileges, to inject arbitrary web script or HTML via the (1) content parameter in conjunction with a /admin/poll/add PATH_INFO, the (2) meta parameter in conjunction with a /admin/category/add PATH_INFO, and the (3) keyword parameter in conjunction with a /admin/tag/add PATH_INFO."}, {"lang": "es", "value": "vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en index.php en TomatoCMS anteriores a v2.0.5 , permite a usuario autenticados, con ciertos permisos de creaci\u00f3n, inyectar secuencias de comandos web o HTML a trav\u00e9s de los par\u00e1metros (1) content junto con /admin/poll/add PATH_INFO, 2) meta junto a /admin/category/add PATH_INFO, y (3) keyword junto a /admin/tag/add PATH_INFO."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:tomatocms:tomatocms:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3A9757F-6D64-4473-AD05-99622D27AFC1", "versionEndIncluding": "2.0.4"}, {"criteria": "cpe:2.3:a:tomatocms:tomatocms:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C22F58CF-182C-459F-9935-B3A729413160"}, {"criteria": "cpe:2.3:a:tomatocms:tomatocms:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E018B4F5-A3A6-4D0F-BD89-59743A38BEF3"}, {"criteria": "cpe:2.3:a:tomatocms:tomatocms:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB0D9BD7-3C4A-478D-B378-E7E7E8014C3A"}, {"criteria": "cpe:2.3:a:tomatocms:tomatocms:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EDC1737-FD83-40FF-A3AB-D4FFF524B8C3"}, {"criteria": "cpe:2.3:a:tomatocms:tomatocms:2.0.3.1430:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFA24A70-6715-48EF-9D3E-51EFC3DD8CDC"}, {"criteria": "cpe:2.3:a:tomatocms:tomatocms:2.0.3.1622:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C8D5050-CC12-423C-A1A0-8410B2818D24"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}