{"vuid":"VU#716144","idnumber":"716144","name":"Verity Ultraseek contains a cross-site scripting vulnerability in the processing of search requests","keywords":["cross-site scripting","css","xss"],"overview":"Verity's Ultraseek application contains a cross-site scripting vulnerability in the processing of search requests.","clean_desc":"Verity Ultraseek is a web site search engine application. Ultraseek contains a cross-site scripting vulnerability in the processing of search requests. More information about cross-site scripting can be found in CERT Advisory CA-2000-02.","impact":"An attacker may be able to obtain sensitive data from a web site that uses Ultraseek. Depending on the nature of the web site, this data may include passwords, credit card numbers, and any arbitrary information provided by the user. Likewise, information stored in cookies could be stolen or corrupted.","resolution":"Install an update\nAccording to Verity, this issue is resolved by upgrading to Ultraseek 5.3.3.","workarounds":"","sysaffected":"","thanks":"Thanks to Michael Krax for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["http://mikx.de/index.php?p=6","https://customers.verity.com/","http://secunia.com/advisories/14367/","http://www.securityfocus.com/bid/12617","http://xforce.iss.net/xforce/xfdb/19430","http://osvdb.org/displayvuln.php?osvdb_id=14045"],"cveids":["CVE-2005-0514"],"certadvisory":"CA-2000-02","uscerttechnicalalert":null,"datecreated":"2004-12-05T04:24:27Z","publicdate":"2004-12-23T00:00:00Z","datefirstpublished":"2005-02-21T16:32:22Z","dateupdated":"2005-03-10T22:09:22Z","revision":18,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"7.425","cam_scorecurrentwidelyknown":"15.525","cam_scorecurrentwidelyknownexploited":"29.025","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.425,"vulnote":null}