Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cpanel:webhost_manager:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAE7E44B-47EB-44E6-8909-295B8612C271", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "6A74988D-80E0-4B28-95AF-D6EFDC7221F0", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "03A9A37F-22E5-4B37-9015-296C9F110DA4", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "24998E50-B477-4B22-90BF-C3F66E15FD9B", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "1091EAE0-8355-4DFE-8469-CB8E0B270B8D", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:6.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "24DD69B3-6EB5-4A81-A7BB-799E738E23CF", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:6.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "331E0D8F-D77F-4582-A27D-8CF3F73D4AF8", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:6.4.2_stable_48:*:*:*:*:*:*:*", "matchCriteriaId": "573F957A-A595-4D87-A204-FB54F5759225", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "B3D8DE9D-191D-47BC-8E85-AA6990C60410", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A54CCB7E-A70D-433A-A441-ABFC64C130D7", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "E80D1C2A-881A-45BC-8264-24783B0054F9", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "70EF3BD3-8466-41E2-AD35-C55909305C46", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:9.1.0_r85:*:*:*:*:*:*:*", "matchCriteriaId": "667CFE82-4242-4CDB-9BBB-B79131AA926A", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:9.4.1_r64:*:*:*:*:*:*:*", "matchCriteriaId": "B5965DEE-87EC-48F7-A145-0D4F6FA1B1AD", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:9.9.1_r3:*:*:*:*:*:*:*", "matchCriteriaId": "7D7CA174-C210-495D-A7FB-8118E75203F8", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:10.2.0_r82:*:*:*:*:*:*:*", "matchCriteriaId": "6DB4702D-EB15-48F9-A611-C70D924982CE", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:10.6.0_r137:*:*:*:*:*:*:*", "matchCriteriaId": "E726334C-AAE6-4F75-87E1-74AA0225AE7C", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:10.8.1_113:*:*:*:*:*:*:*", "matchCriteriaId": "F4F4A77A-A14F-4245-B2B7-7AC52F27DC33", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:10.8.1_build84:*:*:*:*:*:*:*", "matchCriteriaId": "63017CB6-87A9-4071-BD05-3DF327287DD9", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:10.8.2_118:*:*:*:*:*:*:*", "matchCriteriaId": "2694D93E-3007-4AAF-BBEC-883C4CF7C408", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "36E521FE-1070-47C0-94D7-878A92C27659", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:11:*:*:*:*:*:*:*", "matchCriteriaId": "21E68BEE-8F02-4D92-AFE9-C26D9479139B", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "F65B4DDB-DD92-4602-AF30-DC4945BE9C30", "vulnerable": true}, {"criteria": "cpe:2.3:a:cpanel:webhost_manager:11_beta:*:*:*:*:*:*:*", "matchCriteriaId": "8CA5AD81-D28D-4BAA-A5A5-056593C40978", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in scripts/passwdmysql in cPanel WebHost Manager (WHM) 11.0.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the password parameter."}, {"lang": "es", "value": "Vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en scripts/passwdmysql en cPanel WebHost Manager (WHM) 11.0.0 y anteriores permite a un atacante remoto inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro password."}], "id": "CVE-2007-0890", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2007-02-12T23:28:00.000", "references": [{"source": "cve@mitre.org", "url": "http://changelog.cpanel.net/index.cgi"}, {"source": "cve@mitre.org", "url": "http://osvdb.org/32044"}, {"source": "cve@mitre.org", "url": "http://secunia.com/advisories/24106"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/459585/100/0/threaded"}, {"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://www.securityfocus.com/bid/22474"}, {"source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0568"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://changelog.cpanel.net/index.cgi"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/32044"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24106"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/459585/100/0/threaded"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://www.securityfocus.com/bid/22474"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0568"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}