Show plain JSON{"id": "CVE-2010-4631", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2010-12-30T21:00:04.487", "references": [{"url": "http://advisories.ariko-security.com/november/audyt_bezpieczenstwa_745.html", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=full-disclosure&m=128913521908405&w=2", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://packetstormsecurity.org/1011-exploits/aspilotpilotcart-sqlxssinject.txt", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/30176", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.exploit-db.com/exploits/15448", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/44698", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63053", "source": "cve@mitre.org"}, {"url": "http://advisories.ariko-security.com/november/audyt_bezpieczenstwa_745.html", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://marc.info/?l=full-disclosure&m=128913521908405&w=2", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://packetstormsecurity.org/1011-exploits/aspilotpilotcart-sqlxssinject.txt", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/30176", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.exploit-db.com/exploits/15448", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/44698", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63053", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in ASPilot Pilot Cart 7.3 allow remote attackers to inject arbitrary web script or HTML via the (1) countrycode parameter to contact.asp, USERNAME parameter to (2) gateway.asp and (3) cart.asp, and the specific parameter to (4) quote.asp and (5) buyitnow."}, {"lang": "es", "value": "Multiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en ASPilot Pilot Cart 7.3. Permiten a usuarios remotos inyectar codigo de script web o c\u00f3digo HTML de su elecci\u00f3n a trav\u00e9s del (1) par\u00e1metro countrycode de contact.asp, par\u00e1metro USERNAME de (2) gateway.asp y (3) cart.asp, y el par\u00e1metro specific de (4) quote.asp y (5) buyitnow."}], "lastModified": "2024-11-21T01:21:24.300", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:pilotcart:pilot_cart:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49855F6E-8C37-4F17-AC88-EF39593884B5"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}