CVE-2010-0363
Published Jan 20, 2010
Last updated 15 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in Zeus Web Server before 4.3r5, when SSL is enabled for the admin server, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2002-1785.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.6
- Impact score
- 2.9
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:zeus:zeus_web_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32CA2775-003D-40D2-A32E-B4370E961935", "versionEndIncluding": "4.3r4" }, { "criteria": "cpe:2.3:a:zeus:zeus_web_server:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF3C0DD2-15F8-4A76-BB8E-42988AA5751D" }, { "criteria": "cpe:2.3:a:zeus:zeus_web_server:3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA8AE81E-74A4-4745-BB16-688B2F7B77E2" }, { "criteria": "cpe:2.3:a:zeus:zeus_web_server:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9074BFE9-176E-43B7-AEC2-EE83A8AE0921" }, { "criteria": "cpe:2.3:a:zeus:zeus_web_server:4.1r1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAC18555-FACF-41B4-B976-C01526DF6233" }, { "criteria": "cpe:2.3:a:zeus:zeus_web_server:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC5B7188-066F-44B3-ADAF-AA937023A3DE" }, { "criteria": "cpe:2.3:a:zeus:zeus_web_server:4.2r2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F485196B-3E43-4D13-8E33-6579E9BC50BC" }, { "criteria": "cpe:2.3:a:zeus:zeus_web_server:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB434DD5-A283-4540-B5BD-55778D644696" }, { "criteria": "cpe:2.3:a:zeus:zeus_web_server:4.3r3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0963ABB-06D3-46AC-8E80-481B7A2C6CFB" } ], "operator": "OR" } ] } ]