Show plain JSON{"id": "CVE-2013-1905", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2013-06-20T23:55:00.833", "references": [{"url": "http://drupal.org/node/1954588", "tags": ["Patch", "Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://osvdb.org/91745", "source": "secalert@redhat.com"}, {"url": "http://packetstormsecurity.com/files/120985/Drupal-Zero-Point-7.x-Cross-Site-Scripting.html", "source": "secalert@redhat.com"}, {"url": "http://seclists.org/fulldisclosure/2013/Mar/241", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/52775", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/58758", "source": "secalert@redhat.com"}, {"url": "https://drupal.org/node/1953840", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83137", "source": "secalert@redhat.com"}, {"url": "http://drupal.org/node/1954588", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/91745", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://packetstormsecurity.com/files/120985/Drupal-Zero-Point-7.x-Cross-Site-Scripting.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://seclists.org/fulldisclosure/2013/Mar/241", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/52775", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/58758", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://drupal.org/node/1953840", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83137", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Zero Point theme 7.x-1.x before 7.x-1.9 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidades de secuencias de comandos entre sitios m\u00faltiples (XSS) en el tema Zero Point v7.x-1.x antes de 7.x-1.9 para Drupal que permite a atacantes remotos inyectar c\u00f3digo web script o HTML a trav\u00e9s de vectores sin especificar."}], "lastModified": "2024-11-21T01:50:37.700", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:catalin_florian_radut:zeropoint:7.x-1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7B5682C-E368-4E8D-901B-62F6F08C0DF7"}, {"criteria": "cpe:2.3:a:catalin_florian_radut:zeropoint:7.x-1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B92D3BF5-0A5B-4A8B-915F-46A22FA93593"}, {"criteria": "cpe:2.3:a:catalin_florian_radut:zeropoint:7.x-1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "660E5D79-439D-4C3B-97A1-34336C5DE618"}, {"criteria": "cpe:2.3:a:catalin_florian_radut:zeropoint:7.x-1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2708B78-BD17-4E2B-AC83-13FC1C82BA7B"}, {"criteria": "cpe:2.3:a:catalin_florian_radut:zeropoint:7.x-1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6310D8CC-BCEE-41EE-A503-8F516F42E169"}, {"criteria": "cpe:2.3:a:catalin_florian_radut:zeropoint:7.x-1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1AC4736-4E57-4BF1-8C79-5ECF699CA911"}, {"criteria": "cpe:2.3:a:catalin_florian_radut:zeropoint:7.x-1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1FDE811-1EE7-4E86-B362-3C2D02E82759"}, {"criteria": "cpe:2.3:a:catalin_florian_radut:zeropoint:7.x-1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95D3FA34-2862-4F01-8E64-953EA63259FB"}, {"criteria": "cpe:2.3:a:catalin_florian_radut:zeropoint:7.x-1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D42B760-25B8-4C56-9607-213991C13AA9"}, {"criteria": "cpe:2.3:a:catalin_florian_radut:zeropoint:7.x-1.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FB0DF25-3530-4AF8-9B02-FDF88AAC1E01"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "secalert@redhat.com"}