mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
179 lines
6.2 KiB
JSON
179 lines
6.2 KiB
JSON
{
|
|
"id": "CVE-2014-3266",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2014-05-26T00:25:31.300",
|
|
"lastModified": "2015-09-16T19:28:22.250",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the web framework in Cisco Security Manager 4.6 and earlier allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCun65189."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de XSS en el Framework web en Cisco Security Manager 4.6 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un par\u00e1metro no especificado, tambi\u00e9n conocido como Bug ID CSCun65189."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.6",
|
|
"matchCriteriaId": "765CA5F3-C5BA-4D1A-A05A-9DEF7C2C5DAF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.0:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7C9BB8F5-997E-4D2D-A859-FDC23D4AD28C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.0:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F1A7E9AE-64B8-475A-8914-1D3BFD79841A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.0.1:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "48ACDEF6-BAB4-4114-8034-15D58A1572CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.0.1:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FAC58C2C-15B3-4CDD-A320-24D54F12BB72"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.0.1:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BDA8D184-1148-476D-9C35-0D2ED6B324EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B08598EC-5065-4497-80E6-43F145ACB1EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.1:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8CAFA481-6CA8-4E74-9AEF-A497E23597AF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.1:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DF3D3EA0-5EA3-4252-BA51-E149BE3F2AAB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.2:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A0D77CA9-322F-4067-A2FA-36C3F8E70180"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.2:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6CBD8EF7-4732-4C89-87B3-B4221A8C1061"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.3:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1746C2CA-205A-439F-847F-E0D8A51AC81E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.3:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "29D9C646-3741-4BFE-BF9E-ECDAA31A035F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.3:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CBDE791A-0D63-4A67-860E-BD2C0BE61A49"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.4:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C585EC2F-B171-495F-9647-1D86F45E7A16"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.4:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1355DC09-7DF9-407B-885D-341843B41C89"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.4:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AC653725-B441-4827-99C0-6AE3F2AF0E7D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:security_manager:4.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A10E1D3D-456E-4E10-BB71-CE76BF2D13E0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3266",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34340",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/67569",
|
|
"source": "ykramarz@cisco.com"
|
|
}
|
|
]
|
|
} |