Show plain JSON{"id": "CVE-2018-16181", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.0", "baseScore": 6.1, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 2.8}]}, "published": "2019-01-09T23:29:03.873", "references": [{"url": "https://download.daj.co.jp/user/ifilter/V9/", "tags": ["Permissions Required", "Vendor Advisory"], "source": "vultures@jpcert.or.jp"}, {"url": "https://jvn.jp/en/jp/JVN32155106/index.html", "tags": ["Third Party Advisory"], "source": "vultures@jpcert.or.jp"}, {"url": "https://download.daj.co.jp/user/ifilter/V9/", "tags": ["Permissions Required", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://jvn.jp/en/jp/JVN32155106/index.html", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-113"}]}], "descriptions": [{"lang": "en", "value": "HTTP header injection vulnerability in i-FILTER Ver.9.50R05 and earlier may allow remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks that may result in an arbitrary script injection or setting an arbitrary cookie values via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n de cabeceras HTTP en i-FILTER, en versiones 9.50R05 y anteriores, podr\u00eda permitir que atacantes remotos inyecten cabeceras HTTP arbitrarias y lleven a cabo ataques de separaci\u00f3n de respuesta HTTP que podr\u00edan resultar en la inyecci\u00f3n de scripts arbitrarios o en la configuraci\u00f3n de valores de cookie arbitrarios mediante vectores sin especificar."}], "lastModified": "2024-11-21T03:52:14.307", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:daj:i-filter:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35CCC75C-3427-4B4A-9C3F-824930DBFDD5", "versionEndIncluding": "9.50r05"}], "operator": "OR"}]}], "sourceIdentifier": "vultures@jpcert.or.jp"}