{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T17:51:15.784","vulnerabilities":[{"cve":{"id":"CVE-2013-5966","sourceIdentifier":"cve@mitre.org","published":"2013-11-20T13:19:42.383","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in ZK Framework before 5.0.13 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."},{"lang":"es","value":"Vulnerabilidad de XSS en ZK Framework anterior a la versión 5.0.13 permite a atacantes remotos inyectar script web o HTML arbitrario a través de vectores sin especificar."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zkoss:zk_framework:*:*:*:*:*:*:*:*","versionEndIncluding":"5.0.12","matchCriteriaId":"1CB63057-5DE6-494E-B40E-4108B0D266D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:zkoss:zk_framework:5.0.0:*:*:*:*:*:*:*","matchCriteriaId":"4CF79E21-A42F-4A6D-AC57-EC8C13E08A04"},{"vulnerable":true,"criteria":"cpe:2.3:a:zkoss:zk_framework:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"4E1CEFD9-119A-495D-A657-97863067581E"},{"vulnerable":true,"criteria":"cpe:2.3:a:zkoss:zk_framework:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"0BA528FA-6E88-4D4B-88A5-FBBFE747D075"},{"vulnerable":true,"criteria":"cpe:2.3:a:zkoss:zk_framework:5.0.3:*:*:*:*:*:*:*","matchCriteriaId":"0956E646-65E8-4D95-89B1-C0A160AA2506"},{"vulnerable":true,"criteria":"cpe:2.3:a:zkoss:zk_framework:5.0.4:*:*:*:*:*:*:*","matchCriteriaId":"C42B9DAD-A930-42B3-ADF5-EE7A7C166533"},{"vulnerable":true,"criteria":"cpe:2.3:a:zkoss:zk_framework:5.0.5:*:*:*:*:*:*:*","matchCriteriaId":"1B9F3D61-33F8-48B0-97F0-319669700309"},{"vulnerable":true,"criteria":"cpe:2.3:a:zkoss:zk_framework:5.0.6:*:*:*:*:*:*:*","matchCriteriaId":"F835B6F6-9278-4F44-AD6A-4697579A6D8B"},{"vulnerable":true,"criteria":"cpe:2.3:a:zkoss:zk_framework:5.0.7:*:*:*:*:*:*:*","matchCriteriaId":"C8395E6D-B3A9-4753-A262-B4049E095DE4"},{"vulnerable":true,"criteria":"cpe:2.3:a:zkoss:zk_framework:5.0.7.1:*:*:*:*:*:*:*","matchCriteriaId":"2F479A5E-5004-4C79-B48B-C6936B691B68"},{"vulnerable":true,"criteria":"cpe:2.3:a:zkoss:zk_framework:5.0.8:*:*:*:*:*:*:*","matchCriteriaId":"D0C172EE-96D8-403C-865E-3B217FEDA8E5"},{"vulnerable":true,"criteria":"cpe:2.3:a:zkoss:zk_framework:5.0.9:*:*:*:*:*:*:*","matchCriteriaId":"D1F83C52-6475-4AD5-B6FA-5E79C51192C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:zkoss:zk_framework:5.0.10:*:*:*:*:*:*:*","matchCriteriaId":"91E8F9C8-B830-456F-9876-E2BC80762604"},{"vulnerable":true,"criteria":"cpe:2.3:a:zkoss:zk_framework:5.0.11:*:*:*:*:*:*:*","matchCriteriaId":"3F9D06E7-431A-4A0A-9C92-F3A09916F1ED"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/fulldisclosure/2013-11/0101.html","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/55690","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://github.com/zkoss/zk/blob/v5.0.13/zkdoc/release-note","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/fulldisclosure/2013-11/0101.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/55690","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://github.com/zkoss/zk/blob/v5.0.13/zkdoc/release-note","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}