Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://procheckup.com/Vulnerability_PR07-37.php", "name": "http://procheckup.com/Vulnerability_PR07-37.php", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/26663", "name": "26663", "tags": ["Exploit"], "refsource": "BID"}, {"url": "http://secunia.com/advisories/27906", "name": "27906", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.securitytracker.com/id?1019030", "name": "1019030", "tags": [], "refsource": "SECTRACK"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK57952", "name": "PK57952", "tags": [], "refsource": "AIXAPAR"}, {"url": "http://secunia.com/advisories/28196", "name": "28196", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://security.gentoo.org/glsa/glsa-200803-19.xml", "name": "GLSA-200803-19", "tags": [], "refsource": "GENTOO"}, {"url": "http://secunia.com/advisories/29348", "name": "29348", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://docs.info.apple.com/article.html?artnum=307562", "name": "http://docs.info.apple.com/article.html?artnum=307562", "tags": [], "refsource": "CONFIRM"}, {"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html", "name": "APPLE-SA-2008-03-18", "tags": [], "refsource": "APPLE"}, {"url": "http://secunia.com/advisories/29420", "name": "29420", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://securityreason.com/securityalert/3411", "name": "3411", "tags": [], "refsource": "SREASON"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html", "name": "SUSE-SA:2008:021", "tags": [], "refsource": "SUSE"}, {"url": "http://secunia.com/advisories/29640", "name": "29640", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg24019245", "name": "PK65782", "tags": [], "refsource": "AIXAPAR"}, {"url": "http://secunia.com/advisories/30356", "name": "30356", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/30732", "name": "30732", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html", "name": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/33105", "name": "33105", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.ubuntu.com/usn/USN-731-1", "name": "USN-731-1", "tags": [], "refsource": "UBUNTU"}, {"url": "http://secunia.com/advisories/34219", "name": "34219", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://marc.info/?l=bugtraq&m=125631037611762&w=2", "name": "HPSBUX02465", "tags": [], "refsource": "HP"}, {"url": "http://marc.info/?l=bugtraq&m=129190899612998&w=2", "name": "HPSBUX02612", "tags": [], "refsource": "HP"}, {"url": "http://www.vupen.com/english/advisories/2007/4301", "name": "ADV-2007-4301", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2007/4060", "name": "ADV-2007-4060", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2008/1623/references", "name": "ADV-2008-1623", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2008/0924/references", "name": "ADV-2008-0924", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2008/1875/references", "name": "ADV-2008-1875", "tags": [], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38800", "name": "apache-413error-xss(38800)", "tags": [], "refsource": "XF"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12166", "name": "oval:org.mitre.oval:def:12166", "tags": [], "refsource": "OVAL"}, {"url": "http://www.securityfocus.com/archive/1/484410/100/0/threaded", "name": "20071130 PR07-37: XSS on Apache HTTP Server 413 error pages via malformed HTTP method", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a \"413 Request Entity Too Large\" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-79"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2007-6203", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2007-12-03T22:46Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-15T21:50Z"}