Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ubiquity_slideshow_team:ubiquity-slideshow-ubuntu:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A436CCB-3313-402F-9913-AA4A1A16ACF1", "versionEndIncluding": "58.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubiquity_slideshow_team:ubiquity-slideshow-ubuntu:49:*:*:*:*:*:*:*", "matchCriteriaId": "EE9712AC-73A9-47A5-B8B6-5121A7DD0D54", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubiquity_slideshow_team:ubiquity-slideshow-ubuntu:52:*:*:*:*:*:*:*", "matchCriteriaId": "3987464A-B995-4A29-803C-EA43ECD7ED6E", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubiquity_slideshow_team:ubiquity-slideshow-ubuntu:53:*:*:*:*:*:*:*", "matchCriteriaId": "F95E9202-B7A2-4082-A29E-785273868D9A", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubiquity_slideshow_team:ubiquity-slideshow-ubuntu:54:*:*:*:*:*:*:*", "matchCriteriaId": "6D573DE8-7031-4053-B903-2EC0CD3BE50B", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubiquity_slideshow_team:ubiquity-slideshow-ubuntu:55:*:*:*:*:*:*:*", "matchCriteriaId": "7E202294-033E-44E7-91F5-C8B2899F9AB7", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubiquity_slideshow_team:ubiquity-slideshow-ubuntu:56:*:*:*:*:*:*:*", "matchCriteriaId": "EAA02BA0-06BF-4EEA-AC36-C12E2B3C6AEB", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubiquity_slideshow_team:ubiquity-slideshow-ubuntu:57:*:*:*:*:*:*:*", "matchCriteriaId": "F9B9AEA3-95BF-4310-89F1-37523D54983E", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubiquity_slideshow_team:ubiquity-slideshow-ubuntu:58:*:*:*:*:*:*:*", "matchCriteriaId": "7864C2D2-CABF-45F9-85E2-9D824655D5F3", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "ubiquity-slideshow-ubuntu before 58.2, during installation, allows remote man-in-the-middle attackers to execute arbitrary web script or HTML and read arbitrary files via a crafted attribute in the <a> tag of a Twitter feed."}, {"lang": "es", "value": "ubiquity-slideshow-ubuntu anterior a v58.2, durante la instalaci\u00f3n, permite a atacantes \"man-in-the-middle\" ejecutar script de su elecci\u00f3n o leer ficheros de su elecci\u00f3n a trav\u00e9s de atributos manipulados en el tag <a> de un Twitter feed."}], "id": "CVE-2012-0956", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-09-28T15:55:00.820", "references": [{"source": "security@ubuntu.com", "tags": ["Vendor Advisory"], "url": "http://www.ubuntu.com/usn/USN-1561-1"}, {"source": "security@ubuntu.com", "url": "https://bugs.launchpad.net/ubuntu/%2Bsource/ubiquity-slideshow-ubuntu/%2Bbug/991982"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.ubuntu.com/usn/USN-1561-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.launchpad.net/ubuntu/%2Bsource/ubiquity-slideshow-ubuntu/%2Bbug/991982"}], "sourceIdentifier": "security@ubuntu.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}