Lucene search

K
cveMitreCVE-2023-26100
HistoryApr 21, 2023 - 12:15 p.m.

CVE-2023-26100

2023-04-2112:15:07
CWE-79
mitre
web.nvd.nist.gov
22
cve-2023-26100
flowmon
security
vulnerability
xss

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

45.9%

In Progress Flowmon before 12.2.0, an application endpoint failed to sanitize user-supplied input. A threat actor could leverage a reflected XSS vulnerability to execute arbitrary code within the context of a Flowmon user’s web browser.

Affected configurations

Nvd
Node
progressflowmon_osRange<12.2.0
VendorProductVersionCPE
progressflowmon_os*cpe:2.3:o:progress:flowmon_os:*:*:*:*:*:*:*:*

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

45.9%

Related for CVE-2023-26100