Show plain JSON{"id": "CVE-2012-0872", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2012-03-19T19:55:03.827", "references": [{"url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0106.html", "tags": ["Exploit"], "source": "secalert@redhat.com"}, {"url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0113.html", "tags": ["Exploit"], "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2012/02/20/10", "tags": ["Exploit"], "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2012/02/20/5", "tags": ["Exploit"], "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/52090", "source": "secalert@redhat.com"}, {"url": "http://yehg.net/lab/pr0js/advisories/%5BOxWall_1.1.1%5D_xss", "tags": ["Exploit"], "source": "secalert@redhat.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73466", "source": "secalert@redhat.com"}, {"url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0106.html", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0113.html", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2012/02/20/10", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2012/02/20/5", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/52090", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://yehg.net/lab/pr0js/advisories/%5BOxWall_1.1.1%5D_xss", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73466", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in OxWall 1.1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) captchaField, (2) email, (3) form_name, (4) password, (5) realname, (6) repeatPassword, or (7) username parameters to Oxwall/join; (8) captcha, (9) email, (10) form_name, (11) from, or (12) subject parameters to Oxwall/contact; (13) tag parameter to Oxwall/blogs/browse-by-tag; or (14) PATH_INFO to Oxwall/photo/viewlist/tagged, (15) Oxwall/photo/viewlist, or (16) Oxwall/video/viewlist."}, {"lang": "es", "value": "Varias vulnerabilidades de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en OxWall v1.1.1 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de la (1) captchaField, (2) correo electr\u00f3nico, (3) nombre_formulario, (4) contrase\u00f1a (5 ) nombre real, (6) repeatPassword, o (7) los par\u00e1metros de nombre de usuario para Oxwall / join; c\u00f3digo de la imagen (8) (9), correo electr\u00f3nico, (10) nombre_formulario, (11) de, o (12) los par\u00e1metros sujetos a Oxwall / contact; (13) los par\u00e1metros de etiquetas para Oxwall / blogs / navegar por etiquetas, o (14) PATH_INFO de Oxwall / foto / ViewList / etiquetado, (15) Oxwall / foto / ViewList, o (16) Oxwall / v\u00eddeo / ViewList."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:oxwall:oxwall:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04C74EE7-E932-4749-A82D-FF5886D0D8D9", "versionEndIncluding": "1.1.1"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}