{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T02:32:01.660","vulnerabilities":[{"cve":{"id":"CVE-2018-1000868","sourceIdentifier":"cve@mitre.org","published":"2018-12-20T17:29:00.643","lastModified":"2024-11-21T03:40:32.163","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"WeBid version up to current version 1.2.2 contains a Cross Site Scripting (XSS) vulnerability in user_login.php, register.php that can result in Javascript execution in the user's browser, injection of malicious markup into the page. This attack appear to be exploitable via The victim user must click a malicous link. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f."},{"lang":"es","value":"WeBid, hasta la actual versión 1.2.2, contiene una vulnerabilidad Cross-Site Scripting (XSS) en user_login.php y register.php que puede resultar en la ejecución de JavaScript en el navegador del usuario o la inyección de marcas maliciosas en la página. El ataque parece ser explotable mediante una víctima que haga clic en un enlace malicioso. La vulnerabilidad parece haber sido solucionada tras el commit con ID 256a5f9d3eafbc477dcf77c7682446cc4b449c7f."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webidsupport:webid:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2.2","matchCriteriaId":"9EAC0F5C-741F-49B1-B5E0-DE5CF6E1303B"}]}]}],"references":[{"url":"http://bugs.webidsupport.com/view.php?id=648","source":"cve@mitre.org","tags":["Issue Tracking","Release Notes","Vendor Advisory"]},{"url":"https://github.com/renlok/WeBid/commit/256a5f9d3eafbc477dcf77c7682446cc4b449c7f","source":"cve@mitre.org","tags":["Patch"]},{"url":"https://telekomsecurity.github.io/assets/advisories/20181108_WeBid_Multiple_Vulnerabilities.txt","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"http://bugs.webidsupport.com/view.php?id=648","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Release Notes","Vendor Advisory"]},{"url":"https://github.com/renlok/WeBid/commit/256a5f9d3eafbc477dcf77c7682446cc4b449c7f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://telekomsecurity.github.io/assets/advisories/20181108_WeBid_Multiple_Vulnerabilities.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}