Show plain JSON{"id": "CVE-2015-1373", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2015-01-27T20:04:31.340", "references": [{"url": "http://seclists.org/fulldisclosure/2015/Jan/98", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-10.html", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.openwall.com/lists/oss-security/2015/01/23/3", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/72287", "source": "cve@mitre.org"}, {"url": "https://github.com/JRogaishio/ferretCMS/issues/63", "source": "cve@mitre.org"}, {"url": "http://seclists.org/fulldisclosure/2015/Jan/98", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-10.html", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2015/01/23/3", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/72287", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/JRogaishio/ferretCMS/issues/63", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in admin.php in ferretCMS 1.0.4-alpha allow remote attackers to inject arbitrary web script or HTML via the (1) action parameter in a search request, (2) username in a login request, which is not properly handled when logging the event, or (3) page title in an insert action."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en admin.php en ferretCMS 1.0.4-alpha permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s (1) del par\u00e1metro action en una solicitud de b\u00fasqueda, (2) del nombre de usuario en una solicitud de inicio de sesi\u00f3n, lo cual no se maneja correctamente cuando se registra el evento, o (3) del t\u00edtulo de la p\u00e1gina en una acci\u00f3n de insertar."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ferretcms_project:ferretcms:1.0.4:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F3823A0-A21A-49DE-B972-F2C9B8F8B798"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}