{"api_version":"1","generated_at":"2026-05-09T10:36:49+00:00","cve":"CVE-2012-1036","urls":{"html":"https://cve.report/CVE-2012-1036","api":"https://cve.report/api/cve/CVE-2012-1036.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2012-1036","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2012-1036"},"summary":{"title":"CVE-2012-1036","description":"Cross-site scripting (XSS) vulnerability in the telerik HTML editor in DotNetNuke before 5.6.4 and 6.x before 6.1.0 allows remote attackers to inject arbitrary web script or HTML via a message.","state":"PUBLISHED","assigner":"mitre","published_at":"2012-04-11 10:39:26","updated_at":"2026-04-29 01:13:23"},"problem_types":["CWE-79","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"4.3","severity":"","vector":"AV:N/AC:M/Au:N/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"http://technet.microsoft.com/en-us/security/msvr/msvr12-002","name":"http://technet.microsoft.com/en-us/security/msvr/msvr12-002","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Microsoft Vulnerability Research Advisory MSVR12-002: Vulnerability in DotNetNuke Could Allow Arbitrary Script Execution","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.dotnetnuke.com/News/Security-Policy/Security-bulletin-no.59.aspx","name":"http://www.dotnetnuke.com/News/Security-Policy/Security-bulletin-no.59.aspx","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Security bulletin no.59","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2012-1036","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1036","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dnnsoftware","cpe5":"dotnetnuke","cpe6":"4.9.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dnnsoftware","cpe5":"dotnetnuke","cpe6":"4.9.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dnnsoftware","cpe5":"dotnetnuke","cpe6":"5.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dnnsoftware","cpe5":"dotnetnuke","cpe6":"5.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dnnsoftware","cpe5":"dotnetnuke","cpe6":"5.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dnnsoftware","cpe5":"dotnetnuke","cpe6":"5.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dnnsoftware","cpe5":"dotnetnuke","cpe6":"6.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dnnsoftware","cpe5":"dotnetnuke","cpe6":"6.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dnnsoftware","cpe5":"dotnetnuke","cpe6":"6.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"5.6.3","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dnnsoftware","cpe5":"dotnetnuke","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"4.9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"4.9.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"4.9.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"4.9.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.4.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.4.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"1036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dotnetnuke","cpe5":"dotnetnuke","cpe6":"5.6.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2012","cve_id":"1036","cve":"CVE-2012-1036","epss":"0.002630000","percentile":"0.496710000","score_date":"2026-04-26","updated_at":"2026-04-27 00:09:41"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-06T18:45:26.763Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://technet.microsoft.com/en-us/security/msvr/msvr12-002"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.dotnetnuke.com/News/Security-Policy/Security-bulletin-no.59.aspx"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in the telerik HTML editor in DotNetNuke before 5.6.4 and 6.x before 6.1.0 allows remote attackers to inject arbitrary web script or HTML via a message."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2012-04-11T10:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"http://technet.microsoft.com/en-us/security/msvr/msvr12-002"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.dotnetnuke.com/News/Security-Policy/Security-bulletin-no.59.aspx"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2012-1036","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Cross-site scripting (XSS) vulnerability in the telerik HTML editor in DotNetNuke before 5.6.4 and 6.x before 6.1.0 allows remote attackers to inject arbitrary web script or HTML via a message."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://technet.microsoft.com/en-us/security/msvr/msvr12-002","refsource":"MISC","url":"http://technet.microsoft.com/en-us/security/msvr/msvr12-002"},{"name":"http://www.dotnetnuke.com/News/Security-Policy/Security-bulletin-no.59.aspx","refsource":"CONFIRM","url":"http://www.dotnetnuke.com/News/Security-Policy/Security-bulletin-no.59.aspx"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2012-1036","datePublished":"2012-04-11T10:00:00.000Z","dateReserved":"2012-02-08T00:00:00.000Z","dateUpdated":"2024-09-16T17:34:31.589Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2012-04-11 10:39:26","lastModifiedDate":"2026-04-29 01:13:23","problem_types":["CWE-79","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:*","versionEndIncluding":"5.6.3","matchCriteriaId":"55C8F73C-26DC-4A1A-AAFB-64203E90CA94"},{"vulnerable":true,"criteria":"cpe:2.3:a:dnnsoftware:dotnetnuke:4.9.1:*:*:*:*:*:*:*","matchCriteriaId":"C9852A91-F153-49CB-B376-657CBC4593A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:dnnsoftware:dotnetnuke:4.9.2:*:*:*:*:*:*:*","matchCriteriaId":"FCEFF613-B1B3-4799-9D40-E3A092219F25"},{"vulnerable":true,"criteria":"cpe:2.3:a:dnnsoftware:dotnetnuke:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8B6E998E-A32E-4FA5-BAA5-8B4CFB8E53B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:dnnsoftware:dotnetnuke:5.1.2:*:*:*:*:*:*:*","matchCriteriaId":"485DFABC-32FF-4160-8D5D-291473F71E4D"},{"vulnerable":true,"criteria":"cpe:2.3:a:dnnsoftware:dotnetnuke:5.1.3:*:*:*:*:*:*:*","matchCriteriaId":"C992BEB6-17C5-4FEE-A75A-3425A8614FC0"},{"vulnerable":true,"criteria":"cpe:2.3:a:dnnsoftware:dotnetnuke:5.1.4:*:*:*:*:*:*:*","matchCriteriaId":"D9942AEF-A71A-4CA3-898D-CC1DE326593E"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:4.9.0:*:*:*:*:*:*:*","matchCriteriaId":"6EB0D105-8943-4DC8-A513-064B1ABC4A9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:4.9.3:*:*:*:*:*:*:*","matchCriteriaId":"39FED945-3341-4736-95C4-88CFE8B48E83"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:4.9.4:*:*:*:*:*:*:*","matchCriteriaId":"4B9C52F9-E7B7-4EA2-84FD-C78A3EF17893"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:4.9.5:*:*:*:*:*:*:*","matchCriteriaId":"4EFE03E3-0F41-4921-916F-56CDCCE77602"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.0.0:*:*:*:*:*:*:*","matchCriteriaId":"A7C8162B-2426-48F5-A143-FA7425F961B2"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"40D39FE4-5D47-462B-B46E-19F6BE2F6197"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.1.0:*:*:*:*:*:*:*","matchCriteriaId":"0DD98E0F-ABC7-43CF-B2C2-D0027D3D27B0"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.2.0:*:*:*:*:*:*:*","matchCriteriaId":"E96050B6-DE09-49DF-8D6D-1F110AC609EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.2.1:*:*:*:*:*:*:*","matchCriteriaId":"7E32FB03-B65E-4FD3-9595-ED8D19F2ABD8"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.2.2:*:*:*:*:*:*:*","matchCriteriaId":"AEF953F4-BCAB-4FBA-AEA1-3846E0C19BCD"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.2.3:*:*:*:*:*:*:*","matchCriteriaId":"3CD34D98-57B1-4567-B22A-69BCDA96367B"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.3.0:*:*:*:*:*:*:*","matchCriteriaId":"5E7DD606-ACEC-49F7-968B-93CE92DE0FAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.3.1:*:*:*:*:*:*:*","matchCriteriaId":"C3364254-4E9D-4218-BAA6-366A59B3D278"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.4.0:*:*:*:*:*:*:*","matchCriteriaId":"DC69C5AD-E642-4975-BF78-0A87A98C0033"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.4.1:*:*:*:*:*:*:*","matchCriteriaId":"3CF511FB-9BF5-4282-BD46-E7B173B4C554"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.4.2:*:*:*:*:*:*:*","matchCriteriaId":"60DB93BB-9E8C-495C-B6F9-96DE89864A7D"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.4.3:*:*:*:*:*:*:*","matchCriteriaId":"25638D29-3B1C-4093-B85F-622EC84168D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.4.4:*:*:*:*:*:*:*","matchCriteriaId":"26FC5FB1-A6CA-4099-8068-6F01A3A15BB7"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.5.0:*:*:*:*:*:*:*","matchCriteriaId":"E1DE6781-FF23-41F3-AC24-4574DB091970"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"8E03F432-AAEC-49FC-97FE-C816FCC3D8E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.6.0:*:*:*:*:*:*:*","matchCriteriaId":"805FB485-A468-442F-94B0-FFC51FBB8891"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.6.1:*:*:*:*:*:*:*","matchCriteriaId":"B8FC888B-C2EE-459B-9E57-C11C79BDDDBF"},{"vulnerable":true,"criteria":"cpe:2.3:a:dotnetnuke:dotnetnuke:5.6.2:*:*:*:*:*:*:*","matchCriteriaId":"2D38E404-2A46-4014-ABEB-DFAD5AB2EA95"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dnnsoftware:dotnetnuke:6.0.0:*:*:*:*:*:*:*","matchCriteriaId":"D1998F15-AE98-4C16-8036-EFFCF009A9F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:dnnsoftware:dotnetnuke:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"1E488A0B-F58B-435B-A325-A4BCD8937DAC"},{"vulnerable":true,"criteria":"cpe:2.3:a:dnnsoftware:dotnetnuke:6.0.2:*:*:*:*:*:*:*","matchCriteriaId":"E5691D94-22C8-46FA-A91E-0EFA6E75E204"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2012","CveId":"1036","Ordinal":"1","Title":"CVE-2012-1036","CVE":"CVE-2012-1036","Year":"2012"},"notes":[{"CveYear":"2012","CveId":"1036","Ordinal":"1","NoteData":"Cross-site scripting (XSS) vulnerability in the telerik HTML editor in DotNetNuke before 5.6.4 and 6.x before 6.1.0 allows remote attackers to inject arbitrary web script or HTML via a message.","Type":"Description","Title":"CVE-2012-1036"},{"CveYear":"2012","CveId":"1036","Ordinal":"2","NoteData":"2012-04-11","Type":"Other","Title":"Published"}]}}}