ID CVE-2016-2010
Type cve
Reporter cve@mitre.org
Modified 2016-12-01T03:08:00
Description
Cross-site scripting (XSS) vulnerability in HPE Network Node Manager i (NNMi) 9.20, 9.23, 9.24, 9.25, 10.00, and 10.01 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2016-2011.
{"id": "CVE-2016-2010", "bulletinFamily": "NVD", "title": "CVE-2016-2010", "description": "Cross-site scripting (XSS) vulnerability in HPE Network Node Manager i (NNMi) 9.20, 9.23, 9.24, 9.25, 10.00, and 10.01 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2016-2011.", "published": "2016-05-07T10:59:00", "modified": "2016-12-01T03:08:00", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2010", "reporter": "cve@mitre.org", "references": ["https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564", "http://www.securitytracker.com/id/1035767"], "cvelist": ["CVE-2016-2010"], "type": "cve", "lastseen": "2021-02-02T06:28:04", "edition": 4, "viewCount": 2, "enchantments": {"dependencies": {"references": [], "modified": "2021-02-02T06:28:04", "rev": 2}, "score": {"value": 3.2, "vector": "NONE", "modified": "2021-02-02T06:28:04", "rev": 2}, "vulnersScore": 3.2}, "cpe": ["cpe:/a:hp:network_node_manager_i:10.01", "cpe:/a:hp:network_node_manager_i:10.00", "cpe:/a:hp:network_node_manager_i:9.24", "cpe:/a:hp:network_node_manager_i:9.25", "cpe:/a:hp:network_node_manager_i:9.20", "cpe:/a:hp:network_node_manager_i:9.23"], "affectedSoftware": [{"cpeName": "hp:network_node_manager_i", "name": "hp network node manager i", "operator": "eq", "version": "9.20"}, {"cpeName": "hp:network_node_manager_i", "name": "hp network node manager i", "operator": "eq", "version": "10.00"}, {"cpeName": "hp:network_node_manager_i", "name": "hp network node manager i", "operator": "eq", "version": "9.24"}, {"cpeName": "hp:network_node_manager_i", "name": "hp network node manager i", "operator": "eq", "version": "9.25"}, {"cpeName": "hp:network_node_manager_i", "name": "hp network node manager i", "operator": "eq", "version": "10.01"}, {"cpeName": "hp:network_node_manager_i", "name": "hp network node manager i", "operator": "eq", "version": "9.23"}], "cvss2": {"cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": true}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0"}, "exploitabilityScore": 2.3, "impactScore": 2.7}, "cpe23": ["cpe:2.3:a:hp:network_node_manager_i:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_node_manager_i:10.01:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_node_manager_i:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_node_manager_i:10.00:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_node_manager_i:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_node_manager_i:9.23:*:*:*:*:*:*:*"], "cwe": ["CWE-79"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:hp:network_node_manager_i:9.24:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:hp:network_node_manager_i:9.23:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:hp:network_node_manager_i:9.25:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:hp:network_node_manager_i:9.20:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:hp:network_node_manager_i:10.01:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:hp:network_node_manager_i:10.00:*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}]}, "extraReferences": [{"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564", "refsource": "CONFIRM", "tags": ["Patch", "Vendor Advisory"], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564"}, {"name": "1035767", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1035767"}], "immutableFields": []}
{}