Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ea:origin_client:*:*:*:*:*:mac_os:*:*", "matchCriteriaId": "A319431F-C0E1-49AA-9F83-D245B4589980", "versionEndIncluding": "10.5.86", "vulnerable": true}, {"criteria": "cpe:2.3:a:ea:origin_client:*:*:*:*:*:windows:*:*", "matchCriteriaId": "9FE1C198-4C2C-4163-B562-ACF94676D129", "versionEndIncluding": "10.5.86", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A cross-site scripting (XSS) vulnerability exists in the Origin Client for Mac and PC 10.5.86 or earlier that could allow a remote attacker to execute arbitrary Javascript in a target user\u2019s Origin client. An attacker could use this vulnerability to access sensitive data related to the target user\u2019s Origin account, or to control or monitor the Origin text chat window."}, {"lang": "es", "value": "Se presenta una vulnerabilidad de tipo cross-site scripting (XSS) en Origin Client para Mac y PC versi\u00f3n 10.5.86 que podr\u00eda permitir a un atacante remoto ejecutar JavaScript arbitrario en Origin Client de un usuario objetivo. Un atacante podr\u00eda usar esta vulnerabilidad para acceder a datos confidenciales relacionados con la cuenta de Origin del usuario objetivo, o para controlar o monitorear la ventana de chat de texto de Origin"}], "id": "CVE-2020-15914", "lastModified": "2024-11-21T05:06:26.390", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-11-02T21:15:26.397", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://github.com/Monairy/Security-Advisories/blob/master/CVE%202020-15914"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.ea.com/security/news/easec-2020-003-cross-site-scripting-vulnerability-in-origin-client"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/Monairy/Security-Advisories/blob/master/CVE%202020-15914"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.ea.com/security/news/easec-2020-003-cross-site-scripting-vulnerability-in-origin-client"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}