{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T14:26:04.985","vulnerabilities":[{"cve":{"id":"CVE-2010-1137","sourceIdentifier":"cve@mitre.org","published":"2010-04-01T19:30:00.627","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in WebAccess in VMware VirtualCenter 2.0.2 and 2.5 and VMware ESX 3.0.3 and 3.5, and the Server Console in VMware Server 1.0, allows remote attackers to inject arbitrary web script or HTML via the name of a virtual machine."},{"lang":"es","value":"Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en WebAccess in VMware VirtualCenter 2.0.2 y 2.5 y en VMware ESX 3.0.3 y 3.5 y en Server Console en VMware Server 1.0, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante el nombre de una máquina virtual."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:virtualcenter:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"EDFF5385-64AA-48AD-A5FE-25918E4F07D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:virtualcenter:2.5:*:*:*:*:*:*:*","matchCriteriaId":"D17E8DFD-AC99-45E6-81F9-ED66369FBD0A"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*","matchCriteriaId":"73EC33AB-E92A-4AA8-A523-C341133BB515"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:esx_server:3.0.3:*:*:*:*:*:*:*","matchCriteriaId":"C69FB3ED-9E8B-47A7-A326-1CE03B0EB62B"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*","matchCriteriaId":"16EFF4E2-CA32-4FA4-AC4B-82D8C50769D9"}]}]}],"references":[{"url":"http://lists.vmware.com/pipermail/security-announce/2010/000086.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/39037","source":"cve@mitre.org"},{"url":"http://www.securitytracker.com/id?1023769","source":"cve@mitre.org"},{"url":"http://www.vmware.com/security/advisories/VMSA-2010-0005.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6863","source":"cve@mitre.org"},{"url":"http://lists.vmware.com/pipermail/security-announce/2010/000086.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/39037","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1023769","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vmware.com/security/advisories/VMSA-2010-0005.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6863","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}