Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:avast:secure_browser:77.1.1831.91:*:*:*:*:*:*:*", "matchCriteriaId": "8374E1C8-60CD-4293-AB5B-2217FF68476D", "vulnerable": true}, {"criteria": "cpe:2.3:a:avg:secure_browser:77.0.1790.77:*:*:*:*:*:*:*", "matchCriteriaId": "BDFD7A39-B9A0-4D66-80FA-27504D799ECF", "vulnerable": true}, {"criteria": "cpe:2.3:a:video_downloader_project:video_downloader:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA8FBA-5001-4AA4-9979-E4ED72839559", "versionEndExcluding": "1.5", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "XSS in the Video Downloader component before 1.5 of Avast Secure Browser 77.1.1831.91 and AVG Secure Browser 77.0.1790.77 allows websites to execute their code in the context of this component. While Video Downloader is technically a browser extension, it is granted a very wide set of privileges and can for example access cookies and browsing history, spy on the user while they are surfing the web, and alter their surfing experience in almost arbitrary ways."}, {"lang": "es", "value": "Una vulnerabilidad de tipo XSS en el componente Video Downloader versiones anteriores a la versi\u00f3n 1.5 del Avast Secure Browser versi\u00f3n 77.1.1831.91 y AVG Secure Browser versi\u00f3n 77.0.1790.77, permite a los sitios web ejecutar su c\u00f3digo en el contexto de este componente. Aunque Video Downloader es t\u00e9cnicamente una extensi\u00f3n del navegador, se le otorga un rango muy amplio de privilegios y puede, por ejemplo, acceder a cookies y al historial de navegaci\u00f3n, espiar al usuario mientras navega en la web y alterar su experiencia de navegaci\u00f3n en modos casi arbitrarios."}], "id": "CVE-2019-18893", "lastModified": "2024-11-21T04:33:47.577", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-01-13T17:15:11.540", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://palant.de/2020/01/13/pwning-avast-secure-browser-for-fun-and-profit/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://palant.de/2020/01/13/pwning-avast-secure-browser-for-fun-and-profit/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}