René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

104 lines
3.6 KiB
JSON

{
"id": "CVE-2013-0936",
"sourceIdentifier": "security_alert@emc.com",
"published": "2013-03-28T15:55:09.087",
"lastModified": "2013-03-29T04:00:00.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in EMC Smarts IP Manager, Smarts Service Assurance Manager, Smarts Server Manager, Smarts VoIP Availability Manager, Smarts Network Protocol Manager, and Smarts MPLS Manager before 9.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URL."
},
{
"lang": "es",
"value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en EMC Smarts IP Manager, Smarts Service Assurance Manager, Smarts Server Manager ,Smarts VoIP Availability Manager, Smarts Network Protocol Manager, y Smarts MPLS Manager antes de v9.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s una URL dise\u00f1ada"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:smarts_ip_manager:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "25DC6103-D1E7-4E12-8F72-018C61F1D7FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:smarts_mpls_manager:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D090A99D-F37D-452F-9DC6-F43F6125F93B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:smarts_network_protocol_manager:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7EF0BC60-09F9-4F07-861F-364C6FC7AB74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:smarts_server_manager:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D938CB-72DE-4F9A-A1E3-A0FFB6D5615D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:smarts_services_assurance_manager:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C88EFBC-5FA3-49FB-900F-A08617F26090"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:smarts_voip_availability_manager:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "15CA9E8D-3D0F-41B7-BBC2-5229481428A8"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0152.html",
"source": "security_alert@emc.com"
}
]
}