Show plain JSON{"id": "CVE-2006-4727", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2006-12-31T05:00:00.000", "references": [{"url": "http://osvdb.org/ref/28/28722-tumbleweed-emf.txt", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/28722", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42392", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/ref/28/28722-tumbleweed-emf.txt", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/28722", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42392", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in emfadmin/statusView.do in Tumbleweed EMF Administration Module 6.2.2 Build 4123, and possibly other versions before 6.3.2, allows remote attackers to inject arbitrary web script or HTML via the (1) lineId and (2) sort parameters."}, {"lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en emfadmin/statusView.do de Tumbleweed EMF Administration Module 6.2.2 Build 4123 y posiblemente otras versiones anteriores a 6.3.2, permite a atacantes remotos inyectar secuencias de comandos web o HTML mediante los par\u00e1metros (1) lineId y (2) sort."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:tumbleweed:email_firewall:6.2.2_build_4123:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7FAEF26-59E0-4D4F-871B-538B645DB60B"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}