2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-0513" ,
"sourceIdentifier" : "security_alert@emc.com" ,
"published" : "2015-01-21T15:17:11.387" ,
2024-11-22 23:14:22 +00:00
"lastModified" : "2024-11-21T02:23:13.757" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Multiple cross-site scripting (XSS) vulnerabilities in the administrative user interface in EMC M&R (aka Watch4Net) before 6.5u1 and ViPR SRM before 3.6.1 allow remote authenticated users to inject arbitrary web script or HTML by leveraging privileged access to set crafted values of unspecified fields."
} ,
{
"lang" : "es" ,
"value" : "M\u00faltiples vulnerabilidades XSS en la interfaz de usuario de administraci\u00f3n en EMC M&R (tambi\u00e9n conocido como Watch4Net) anterior a 6.5u1 y ViPR SRM anterior a 3.6.1 permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios aprovech\u00e1ndose de privilegios de acceso para establecer valores modificados de campos sin especificar"
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N" ,
2024-11-22 23:14:22 +00:00
"baseScore" : 3.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 23:14:22 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 6.8 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:emc:watch4net:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "6.5" ,
"matchCriteriaId" : "ED56487F-4AA2-463F-9E14-F80639F88520"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:emc:vipr_srm:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "3.6.0" ,
"matchCriteriaId" : "76B4F87A-7B05-439C-9CFF-1EEC3DFC20DB"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://archives.neohapsis.com/archives/bugtraq/2015-01/0092.html" ,
"source" : "security_alert@emc.com" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/72259" ,
"source" : "security_alert@emc.com" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1031567" ,
"source" : "security_alert@emc.com"
2024-11-22 23:14:22 +00:00
} ,
{
"url" : "http://archives.neohapsis.com/archives/bugtraq/2015-01/0092.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/72259" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1031567" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}