Show plain JSON{"id": "CVE-2007-1395", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2007-03-10T22:19:00.000", "references": [{"url": "http://osvdb.org/35048", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/26733", "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/2402", "source": "cve@mitre.org"}, {"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:199", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/462139/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.us.debian.org/security/2007/dsa-1370", "source": "cve@mitre.org"}, {"url": "http://www.virtuax.be/advisories/Advisory2-24012007.txt", "tags": ["Exploit", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32858", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Incomplete blacklist vulnerability in index.php in phpMyAdmin 2.8.0 through 2.9.2 allows remote attackers to conduct cross-site scripting (XSS) attacks by injecting arbitrary JavaScript or HTML in a (1) db or (2) table parameter value followed by an uppercase </SCRIPT> end tag, which bypasses the protection against lowercase </script>."}, {"lang": "es", "value": "Vulnerabilidad de lista negra incompleta en index.php en phpMyAdmin 2.8.0 hasta 2.9.2 permite a atacantes remotos llevar a cabo ataques de secuencias de comandos de sitios cruzados (XSS) por inyecci\u00f3n de JavaScript de su elecci\u00f3n o HTML en un valor par\u00e1metro (1)db o (2) table seguido de una etiqueta de fin \"may\u00fascula\" </SCRIPT>, la cual evita la protecci\u00f3n contra la \"min\u00fascula\" </script>."}], "lastModified": "2018-10-16T16:38:22.313", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60F2B3C2-0EDB-48D3-92BC-B1CA0E41F230"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9852676-A91F-4FD6-A734-BF7E048411FD"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC64B22B-E415-4510-A0DF-CE4763A423D1"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12375469-DD81-42BE-8BC0-FCAB0D2D6253"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCEF6246-C393-41BE-BABC-840585795D53"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.1_dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E384B8D4-C72C-4D3D-A25F-26FB5F1D4B89"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2ACC829-CF64-4F20-8827-AA95002A6F5F"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05D4C98E-D127-40EB-BE71-A6BB91D4392C"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C26B2DE-669F-4F79-99AE-3210662AAB85"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4B64201-5B5B-4D22-B341-C601DC54BFB3"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44DA3E88-1572-484D-A4DB-A99EF7D73129"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E65F392-A841-461A-921C-91F40330F3F4"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A7F2F4E-7DCC-43F8-BB69-BE553C2F8F66"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CDE3326-8B3F-4C3A-BA40-6F91CDFAFA76"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_beta1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36C4A673-5ACD-4D1A-A780-5CD279230051"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0534C39C-A421-4C97-8A96-A74ABFA78B92"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BD0DFB0-92F1-4914-A637-A2EBCE0A9BCF"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6354257-6B1A-4729-9EE2-19D3CD2AD62B"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4686B445-3843-4173-8565-16BF364EF911"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1519A451-0EC8-4718-991D-948572C08410"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9ACAA116-2853-456B-BC9C-B036A0F99FB3"}, {"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8AF5A1A-328E-43A1-8C41-0DAB1F337FA6"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}