mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
341 lines
13 KiB
JSON
341 lines
13 KiB
JSON
{
|
|
"id": "CVE-2016-2058",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2016-04-13T16:59:08.787",
|
|
"lastModified": "2018-10-09T19:59:33.850",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow (1) remote Xymon clients to inject arbitrary web script or HTML via a status-message, which is not properly handled in the \"detailed status\" page, or (2) remote authenticated users to inject arbitrary web script or HTML via an acknowledgement message, which is not properly handled in the \"status\" page."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades de XSS en Xymon 4.1.x, 4.2.x y 4.3.x en versiones anteriores a 4.3.25 permiten a (1) clientes remotos Xymon inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un mensaje de estado, que no se maneja correctamente en la p\u00e1gina \"detailed status\", o (2) usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un mensaje de reconocimiento, que no se maneja correctamente en la p\u00e1gina \"status\"."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.4,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 2.7
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 3.5
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 6.8,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DFF9FA93-847A-4643-BB90-90AC31DE7C72"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F7A7DED6-B90D-4A05-ACF1-510D16B2C1F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B3EBFA2C-78A8-45BB-B6E2-F74595943813"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.1.2:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A33AD76-55B7-42B4-997B-B4C595030AC9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.1.2:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DB9A6911-0622-4A71-8ADA-1BC162F12C96"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.2:alfa:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD605003-3DEC-44C3-9A61-9DAA3FFEF4EF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.2:beta20060605:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6D967474-9D3D-4555-9C28-AD9F38D0F4B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.2:rc20060712:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B0623B70-5545-4D9E-80B2-F12363933152"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8483753-07E0-476A-8D04-85905B50CEB4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1071598C-C7CC-4704-A883-7FBAE94F3573"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.2.2:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2EBC151E-A02F-409B-86E1-9B3F59966F20"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D6C4977F-2C44-4222-BD38-266127076A0C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.2.3:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59DEEBE8-4A76-4DF8-8DD4-0446EA6CDDAF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "699A4A57-0488-43A1-9BC9-68F69326CD65"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.0:beta1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E4BEDF60-02D7-4192-A3BE-6D35A6BAE886"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.0:beta2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8AE0300B-8514-409A-AA89-A591918855C7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.0:beta3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FD5FA1D-576F-4A4F-873B-8F47BD871374"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EB113981-5BE0-4AAC-94E3-6A2C34A5E7E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B0EA40FA-CA00-43B6-80DF-DFD2C1D77ECE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8785A4E4-22A1-437C-9CBB-9B141938DF6A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9EF9762-78D4-4C99-B986-BDA9D8C334F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9D161D58-6573-426B-9578-C2340280CB08"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3148DF23-6EA1-4091-BFF0-14E33895B7B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8AD586CB-19F5-41A3-86A6-46986156DC5B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3CC494B4-0A5A-4D55-B98B-D929394F7839"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D3B17CB4-E8CE-4C3E-B0D1-86FCEBA2F339"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA3B4A8F-D0EF-4C50-AA0E-6507F1815595"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD471985-1D60-4E68-B862-7DCC18A76235"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F6E92CA4-44AB-4A95-A8D5-57F9167E4549"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7FC838D-6AA2-491C-9F1C-0B69141531CA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11DA6306-D261-459E-B311-7AD978E915A8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E6C75E3-6935-435F-989B-811C6D9846FD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD68AC81-36CB-493D-AB17-4C753148C04F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C6A1FD6-DAB8-4A19-A279-8DD721E9BF92"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D78C91F-1763-40C0-906C-9DE90E8776C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B213484-1A35-4024-96B8-B5642E7FFF2A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.19:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AFA3F5E6-3C5C-436D-B131-AB9F328CFB28"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.19:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2BA9B919-E977-4C76-8132-D5C72EE0ED80"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8F75C2CF-95CC-4510-AD93-7ABF8F810DF1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.21:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "20837B84-D33F-49AE-A886-53683351746D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.22:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CADB87EA-D745-4776-991D-EABFD7CFD149"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.23:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "56394517-A9F0-4BEE-A185-0684BE30CF14"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:xymon:xymon:4.3.24:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2788A97E-E027-424B-85CF-4121CFC81671"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2016/dsa-3495",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/537522/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://sourceforge.net/p/xymon/code/7892/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
}
|
|
]
|
|
} |