{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T14:48:43.569","vulnerabilities":[{"cve":{"id":"CVE-2013-1808","sourceIdentifier":"secalert@redhat.com","published":"2013-04-02T03:23:26.280","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in ZeroClipboard.swf and ZeroClipboard10.swf in ZeroClipboard before 1.0.8, as used in em-shorty, RepRapCalculator, Fulcrum, Django, aCMS, and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter.  NOTE: this is might be the same vulnerability as CVE-2013-1463. If so, it is likely that CVE-2013-1463 will be REJECTed."},{"lang":"es","value":"Una vulnerabilidad de tipo Cross-site scripting (XSS) en los archivos ZeroClipboard.swf y ZeroClipboard10.swf en ZeroClipboard anterior a versión 1.0.8, tal como es usado en em-shorty, RepRapCalculator, Fulcrum, Django, aCMS y otros productos, permite a atacantes remotos inyectar script web  HTML arbitrario por medio del parámetro id. NOTA: esta es la misma vulnerabilidad que CVE-2013-1463. Si es así, es probable que CVE-2013-1463 será RECHAZADO."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zeroclipboard_project:zeroclipboard:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.7","matchCriteriaId":"F0284A7C-86A6-4613-92AA-252D73C6143C"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeroclipboard_project:zeroclipboard:1.0.5:*:*:*:*:*:*:*","matchCriteriaId":"A25DABC8-9172-45BA-929A-09787D8C83B2"}]}]}],"references":[{"url":"http://seclists.org/fulldisclosure/2013/Apr/87","source":"secalert@redhat.com"},{"url":"http://seclists.org/fulldisclosure/2013/Apr/88","source":"secalert@redhat.com"},{"url":"http://seclists.org/fulldisclosure/2013/Feb/103","source":"secalert@redhat.com"},{"url":"http://seclists.org/fulldisclosure/2013/Feb/109","source":"secalert@redhat.com"},{"url":"http://seclists.org/fulldisclosure/2013/Mar/5","source":"secalert@redhat.com"},{"url":"http://securityvulns.ru/docs29103.html","source":"secalert@redhat.com"},{"url":"http://securityvulns.ru/docs29104.html","source":"secalert@redhat.com","tags":["Exploit"]},{"url":"http://securityvulns.ru/docs29105.html","source":"secalert@redhat.com"},{"url":"http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb","source":"secalert@redhat.com"},{"url":"http://www.openwall.com/lists/oss-security/2013/03/03/3","source":"secalert@redhat.com"},{"url":"http://www.openwall.com/lists/oss-security/2013/03/10/2","source":"secalert@redhat.com","tags":["Exploit"]},{"url":"http://www.openwall.com/lists/oss-security/2013/03/25/1","source":"secalert@redhat.com"},{"url":"http://www.openwall.com/lists/oss-security/2013/03/26/8","source":"secalert@redhat.com"},{"url":"http://www.securityfocus.com/bid/58257","source":"secalert@redhat.com","tags":["Exploit"]},{"url":"https://github.com/jonrohan/ZeroClipboard/blob/master/docs/releases.md#zeroclipboard-108","source":"secalert@redhat.com"},{"url":"https://github.com/jonrohan/ZeroClipboard/commit/a0e02933f5f7ce5f364fbad36a005f0a349f0696","source":"secalert@redhat.com"},{"url":"http://seclists.org/fulldisclosure/2013/Apr/87","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/fulldisclosure/2013/Apr/88","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/fulldisclosure/2013/Feb/103","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/fulldisclosure/2013/Feb/109","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/fulldisclosure/2013/Mar/5","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securityvulns.ru/docs29103.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securityvulns.ru/docs29104.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://securityvulns.ru/docs29105.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2013/03/03/3","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2013/03/10/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.openwall.com/lists/oss-security/2013/03/25/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2013/03/26/8","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/58257","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://github.com/jonrohan/ZeroClipboard/blob/master/docs/releases.md#zeroclipboard-108","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/jonrohan/ZeroClipboard/commit/a0e02933f5f7ce5f364fbad36a005f0a349f0696","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}