Show plain JSON{"id": "CVE-2011-4054", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2011-12-08T11:55:01.970", "references": [{"url": "http://www.kb.cert.org/vuls/id/713012", "tags": ["US Government Resource"], "source": "cret@cert.org"}, {"url": "http://www.kb.cert.org/vuls/id/MAPG-8MCH2B", "source": "cret@cert.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in login.fcc in CA SiteMinder R6 SP6 before CR7 and R12 SP3 before CR8 allows remote attackers to inject arbitrary web script or HTML via the postpreservationdata parameter."}, {"lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados en login.fcc en CA SiteMinder R6 SP6 antes de CR7 y R12 SP3 antes de CR8, permite a atacantes remotos ejecutar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro postpreservationdata."}], "lastModified": "2012-03-05T05:00:00.000", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ca:siteminder:*:sp6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB68089D-C1D3-4A12-8630-6943EA532289", "versionEndIncluding": "6"}, {"criteria": "cpe:2.3:a:ca:siteminder:*:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92E659EF-9BD9-4628-8026-A1E08BB0B0C6", "versionEndIncluding": "12"}], "operator": "OR"}]}], "sourceIdentifier": "cret@cert.org"}