Vulnerability Details : CVE-2011-1716
Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Xymon before 4.3.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2011-1716
Probability of exploitation activity in the next 30 days: 0.28%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 64 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-1716
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2011-1716
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1716
-
http://www.securityfocus.com/archive/1/517316/100/0/threaded
SecurityFocus
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/66542
Xymon Monitor multiple unspecified cross-site scripting CVE-2011-1716 Vulnerability Report
-
http://xymon.svn.sourceforge.net/viewvc/xymon/branches/4.3.2/Changes?revision=6673&view=markup
404 Not Found
-
http://www.securityfocus.com/bid/47156
Xymon Monitor Unspecified Multiple Cross Site Scripting Vulnerabilities
-
http://www.securityfocus.com/archive/1/517325/100/0/threaded
SecurityFocus
-
http://securityreason.com/securityalert/8209
Xymon monitor cross-site scripting vulnerabilities - CXSecurity.com
Products affected by CVE-2011-1716
- cpe:2.3:a:xymon:xymon:*:*:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:*:rc3:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:*:rc4:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:*:beta3:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:*:beta5:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:*:beta6:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:*:rc1:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:*:rc5:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:*:rc6:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:*:rc2:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:*:beta4:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.3.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.3.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.3.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.1.2:p2:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.1.2:p1:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.3.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:xymon:xymon:4.0.3:*:*:*:*:*:*:*