{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T11:02:11.972","vulnerabilities":[{"cve":{"id":"CVE-2009-4608","sourceIdentifier":"cve@mitre.org","published":"2010-01-13T11:30:00.623","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in Canon IT Solutions Inc. ACCESSGUARDIAN 3.0.14 and earlier, and 3.5.6 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to authentication."},{"lang":"es","value":"Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Canon IT Solutions Inc. ACCESSGUARDIAN v3.0.14 y anteriores y v3.5.6 y anteriores, permite a atacantes remotos inyectar secuencias arbitrarias de comandos web o HTML a través de vectores desconocidos relacionados con la autenticación."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:canon-its:accessguardian:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndIncluding":"3.0.14","matchCriteriaId":"7CA66DE4-679A-4120-B7D1-6937799FA87E"},{"vulnerable":true,"criteria":"cpe:2.3:a:canon-its:accessguardian:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5","versionEndIncluding":"3.5.6","matchCriteriaId":"C1BC40D5-CC39-49BA-B064-4B3410890D1B"}]}]}],"references":[{"url":"http://canon-its.jp/guardian/topics/200910ag.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://jvn.jp/en/jp/JVN33822756/index.html","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000066.html","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://osvdb.org/59058","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://secunia.com/advisories/37045","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.vupen.com/english/advisories/2009/2973","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/53822","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://canon-its.jp/guardian/topics/200910ag.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://jvn.jp/en/jp/JVN33822756/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000066.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://osvdb.org/59058","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"http://secunia.com/advisories/37045","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.vupen.com/english/advisories/2009/2973","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/53822","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}}]}