Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://issues.apache.org/jira/browse/GERONIMO-1474", "name": "http://issues.apache.org/jira/browse/GERONIMO-1474", "tags": ["Exploit", "Vendor Advisory"], "refsource": "MISC"}, {"url": "http://www.oliverkarow.de/research/geronimo_css.txt", "name": "http://www.oliverkarow.de/research/geronimo_css.txt", "tags": ["Exploit", "Vendor Advisory"], "refsource": "MISC"}, {"url": "https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181&styleName=Html&projectId=10220&Create=Create", "name": "https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181&styleName=Html&projectId=10220&Create=Create", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/16260", "name": "16260", "tags": ["Exploit"], "refsource": "BID"}, {"url": "http://secunia.com/advisories/18485", "name": "18485", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html", "name": "RHSA-2008:0261", "tags": [], "refsource": "REDHAT"}, {"url": "http://rhn.redhat.com/errata/RHSA-2008-0630.html", "name": "RHSA-2008:0630", "tags": [], "refsource": "REDHAT"}, {"url": "http://secunia.com/advisories/31493", "name": "31493", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.vupen.com/english/advisories/2006/0217", "name": "ADV-2006-0217", "tags": [], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24159", "name": "geronimo-webaccesslog-viewer-xss(24159)", "tags": [], "refsource": "XF"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24158", "name": "geronimo-jspexamples-xss(24158)", "tags": [], "refsource": "XF"}, {"url": "http://www.securityfocus.com/archive/1/421996/100/0/threaded", "name": "20060115 Apache Geronimo 1.0 - CSS and persistent HTML-Injectionvulnerabilities", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2006-0254", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2006-01-18T01:51Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:apache:geronimo:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-19T15:43Z"}