jvndb-2008-000043
Vulnerability from jvndb
Published
2008-07-29 14:56
Modified
2008-07-29 14:56
Summary
K's CGI Access Log Kaiseki (jcode.pl) vulnerable to cross-site scripting
Details
analysis.cgi included in K's CGI Access Log Kaiseki (jcode.pl) contains a cross-site scripting vulnerability.
K's CGI Access Log Kaiseki is a program to analyze access to a web page. analysis.cgi included in Access Log Kaiseki (Jcode.pl) contains a cross-site scripting vulnerability.
The developer has released the information "Important Note as of 2008 July 18" on the developer's homepage regarding this issue.
AzureStone of securecoding.jp reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000043.html",
"dc:date": "2008-07-29T14:56+09:00",
"dcterms:issued": "2008-07-29T14:56+09:00",
"dcterms:modified": "2008-07-29T14:56+09:00",
"description": "analysis.cgi included in K\u0027s CGI Access Log Kaiseki (jcode.pl) contains a cross-site scripting vulnerability.\r\n\r\nK\u0027s CGI Access Log Kaiseki is a program to analyze access to a web page. analysis.cgi included in Access Log Kaiseki (Jcode.pl) contains a cross-site scripting vulnerability. \r\n\r\nThe developer has released the information \"Important Note as of 2008 July 18\" on the developer\u0027s homepage regarding this issue.\r\n\r\nAzureStone of securecoding.jp reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000043.html",
"sec:cpe": {
"#text": "cpe:/a:misc:kscgi_access_log_kaiseki_jcode.pl",
"@product": "Access Log Kaiseki (jcode.pl)",
"@vendor": "K\u0027s CGI",
"@version": "2.2"
},
"sec:cvss": {
"@score": "5.0",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2008-000043",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN46869708/index.html",
"@id": "JVN#46869708",
"@source": "JVN"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4663",
"@id": "CVE-2008-4663",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4663",
"@id": "CVE-2008-4663",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-79",
"@title": "Cross-site Scripting(CWE-79)"
}
],
"title": "K\u0027s CGI Access Log Kaiseki (jcode.pl) vulnerable to cross-site scripting"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…