Show plain JSON{"id": "CVE-2011-0773", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2011-02-04T01:00:10.653", "references": [{"url": "http://blog.pivotx.net/2011-01-31/pivotx-223-released", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://osvdb.org/70672", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://packetstormsecurity.org/files/view/97831/Pivotx222-xss.txt", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://pivot-weblog.svn.sf.net/viewvc/pivot-weblog?view=revision&revision=3459", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/43045", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/8063", "source": "cve@mitre.org"}, {"url": "http://twitter.com/pivotx/statuses/29889056263376898", "source": "cve@mitre.org"}, {"url": "http://www.autosectools.com/Advisories/PivotX.2.2.2_Reflected.Cross-site.Scripting_76.html", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/45983", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64976", "source": "cve@mitre.org"}, {"url": "http://blog.pivotx.net/2011-01-31/pivotx-223-released", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/70672", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://packetstormsecurity.org/files/view/97831/Pivotx222-xss.txt", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://pivot-weblog.svn.sf.net/viewvc/pivot-weblog?view=revision&revision=3459", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/43045", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/8063", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://twitter.com/pivotx/statuses/29889056263376898", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.autosectools.com/Advisories/PivotX.2.2.2_Reflected.Cross-site.Scripting_76.html", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/45983", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64976", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in pivotx/modules/module_image.php in PivotX before 2.2.3 allows remote attackers to inject arbitrary web script or HTML via the image parameter."}, {"lang": "es", "value": "Una vulnerabilidad de tipo cross-site scripting (XSS) en el archivo pivotx/modules/module_image.php en PivotX anterior a versi\u00f3n 2.2.3, permite a los atacantes remotos inyectar script web o HTML arbitrario por medio del par\u00e1metro image."}], "lastModified": "2024-11-21T01:24:48.480", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:pivotx:pivotx:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA574A29-853A-4EB8-9156-7E546BC3C2FE", "versionEndIncluding": "2.2.2"}, {"criteria": "cpe:2.3:a:pivotx:pivotx:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3990C45-2F1A-4E97-80CD-1BF07A6DEE84"}, {"criteria": "cpe:2.3:a:pivotx:pivotx:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "847926C5-EC16-420B-993F-D0C6991DD0AD"}, {"criteria": "cpe:2.3:a:pivotx:pivotx:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "101512B3-9573-45F0-8E23-ECCFBC7BC981"}, {"criteria": "cpe:2.3:a:pivotx:pivotx:2.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEB36519-001A-446F-B680-2DCBF4A7C4F8"}, {"criteria": "cpe:2.3:a:pivotx:pivotx:2.2.0:b1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D09514E0-221A-4A8C-BE34-CCCEDFBE54C4"}, {"criteria": "cpe:2.3:a:pivotx:pivotx:2.2.0:b2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A43A812E-D866-45AB-92DF-A5617279FC10"}, {"criteria": "cpe:2.3:a:pivotx:pivotx:2.2.0:rc:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "179DBEB0-22A0-46EA-9E48-BC3A79C1E37A"}, {"criteria": "cpe:2.3:a:pivotx:pivotx:2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FF74C6E-E55E-4C01-B4C9-6BB60D57E889"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}