Show plain JSON{"id": "CVE-2008-1165", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2008-03-05T23:44:00.000", "references": [{"url": "http://flyspray.org/fsa:3", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/29215", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40963", "source": "cve@mitre.org"}, {"url": "http://flyspray.org/fsa:3", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/29215", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40963", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Flyspray 0.9.9 through 0.9.9.4 allow remote attackers to inject arbitrary web script or HTML via (1) a forced SQL error message or (2) old_value and new_value database fields in task summaries, related to the item_summary parameter in a details action in index.php. NOTE: some of these details are obtained from third party information."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Flyspray de 0.9.9 a 0.9.9.4 permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de 1) un mensaje forzado de error SQL o (2) los campos old_value y new_value database en task summaries, relacionados con el par\u00e1metro item_summary en una acci\u00f3n details en index.php. NOTA: algunos de estos detalles se han obtenido \u00fanicamente de informaci\u00f3n de terceros."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:flyspray:flyspray:0.9.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A3B6A62-B941-49CC-820B-2E8AF21438EB"}, {"criteria": "cpe:2.3:a:flyspray:flyspray:0.9.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "467BEC81-7F89-40DD-8194-45C1978A43DD"}, {"criteria": "cpe:2.3:a:flyspray:flyspray:0.9.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3593A1D6-B4EE-40A3-A807-3BE34290C4F6"}, {"criteria": "cpe:2.3:a:flyspray:flyspray:0.9.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04ABFF20-F663-416B-B3C3-00B12F6FDE99"}, {"criteria": "cpe:2.3:a:flyspray:flyspray:0.9.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BFF89F6-911C-46CD-BD2E-D1498A0C8E8E"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}