GSD-2009-0359
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
Multiple cross-site scripting (XSS) vulnerabilities in Samizdat before 0.6.2 allow remote authenticated users to inject arbitrary web script or HTML via the (1) message title or (2) user full name.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2009-0359",
"description": "Multiple cross-site scripting (XSS) vulnerabilities in Samizdat before 0.6.2 allow remote authenticated users to inject arbitrary web script or HTML via the (1) message title or (2) user full name.",
"id": "GSD-2009-0359",
"references": [
"https://packetstormsecurity.com/files/cve/CVE-2009-0359"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-0359"
],
"details": "Multiple cross-site scripting (XSS) vulnerabilities in Samizdat before 0.6.2 allow remote authenticated users to inject arbitrary web script or HTML via the (1) message title or (2) user full name.",
"id": "GSD-2009-0359",
"modified": "2023-12-13T01:19:43.890744Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0359",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Samizdat before 0.6.2 allow remote authenticated users to inject arbitrary web script or HTML via the (1) message title or (2) user full name."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "52022",
"refsource": "OSVDB",
"url": "http://osvdb.org/52022"
},
{
"name": "http://samizdat.nongnu.org/release-notes/samizdat-0.6.1-xss-escape-title.patch",
"refsource": "CONFIRM",
"url": "http://samizdat.nongnu.org/release-notes/samizdat-0.6.1-xss-escape-title.patch"
},
{
"name": "[debian-testing-security-announce] 20090211 Security update for Debian Testing - 2009-02-12",
"refsource": "MLIST",
"url": "http://www.mail-archive.com/debian-testing-security-announce@lists.debian.org/msg00171.html"
},
{
"name": "20090213 Cross-site scripting in Samizdat 0.6.1",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/500961/100/0/threaded"
},
{
"name": "http://www.nongnu.org/samizdat/release-notes/samizdat-0.6.2.html",
"refsource": "CONFIRM",
"url": "http://www.nongnu.org/samizdat/release-notes/samizdat-0.6.2.html"
},
{
"name": "33768",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33768"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nongnu:samizdat:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "0.6.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0359"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Samizdat before 0.6.2 allow remote authenticated users to inject arbitrary web script or HTML via the (1) message title or (2) user full name."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://samizdat.nongnu.org/release-notes/samizdat-0.6.1-xss-escape-title.patch",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://samizdat.nongnu.org/release-notes/samizdat-0.6.1-xss-escape-title.patch"
},
{
"name": "[debian-testing-security-announce] 20090211 Security update for Debian Testing - 2009-02-12",
"refsource": "MLIST",
"tags": [],
"url": "http://www.mail-archive.com/debian-testing-security-announce@lists.debian.org/msg00171.html"
},
{
"name": "http://www.nongnu.org/samizdat/release-notes/samizdat-0.6.2.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.nongnu.org/samizdat/release-notes/samizdat-0.6.2.html"
},
{
"name": "33768",
"refsource": "BID",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/33768"
},
{
"name": "52022",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/52022"
},
{
"name": "20090213 Cross-site scripting in Samizdat 0.6.1",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/500961/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-11T21:01Z",
"publishedDate": "2009-02-17T17:30Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…