Multiple cross-site scripting (XSS) vulnerabilities in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow (1) remote Xymon clients to inject arbitrary web script or HTML via a status-message, which is not properly handled in the "detailed status" page, or (2) remote authenticated users to inject arbitrary web script or HTML via an acknowledgement message, which is not properly handled in the "status" page.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html - | |
References | () http://www.debian.org/security/2016/dsa-3495 - | |
References | () http://www.securityfocus.com/archive/1/537522/100/0/threaded - | |
References | () https://sourceforge.net/p/xymon/code/7892/ - Patch |
Information
Published : 2016-04-13 16:59
Updated : 2024-11-21 02:47
NVD link : CVE-2016-2058
Mitre link : CVE-2016-2058
CVE.ORG link : CVE-2016-2058
JSON object : View
Products Affected
xymon
- xymon
debian
- debian_linux
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')