JVNDB-2008-000043
Vulnerability from jvndb - Published: 2008-07-29 14:56 - Updated:2008-07-29 14:56Summary
K's CGI Access Log Kaiseki (jcode.pl) vulnerable to cross-site scripting
Details
analysis.cgi included in K's CGI Access Log Kaiseki (jcode.pl) contains a cross-site scripting vulnerability.
K's CGI Access Log Kaiseki is a program to analyze access to a web page. analysis.cgi included in Access Log Kaiseki (Jcode.pl) contains a cross-site scripting vulnerability.
The developer has released the information "Important Note as of 2008 July 18" on the developer's homepage regarding this issue.
AzureStone of securecoding.jp reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000043.html",
"dc:date": "2008-07-29T14:56+09:00",
"dcterms:issued": "2008-07-29T14:56+09:00",
"dcterms:modified": "2008-07-29T14:56+09:00",
"description": "analysis.cgi included in K\u0027s CGI Access Log Kaiseki (jcode.pl) contains a cross-site scripting vulnerability.\r\n\r\nK\u0027s CGI Access Log Kaiseki is a program to analyze access to a web page. analysis.cgi included in Access Log Kaiseki (Jcode.pl) contains a cross-site scripting vulnerability. \r\n\r\nThe developer has released the information \"Important Note as of 2008 July 18\" on the developer\u0027s homepage regarding this issue.\r\n\r\nAzureStone of securecoding.jp reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000043.html",
"sec:cpe": {
"#text": "cpe:/a:misc:kscgi_access_log_kaiseki_jcode.pl",
"@product": "Access Log Kaiseki (jcode.pl)",
"@vendor": "K\u0027s CGI",
"@version": "2.2"
},
"sec:cvss": {
"@score": "5.0",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2008-000043",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN46869708/index.html",
"@id": "JVN#46869708",
"@source": "JVN"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4663",
"@id": "CVE-2008-4663",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4663",
"@id": "CVE-2008-4663",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-79",
"@title": "Cross-site Scripting(CWE-79)"
}
],
"title": "K\u0027s CGI Access Log Kaiseki (jcode.pl) vulnerable to cross-site scripting"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…