Lucene search

K
nvd[email protected]NVD:CVE-2023-26100
HistoryApr 21, 2023 - 12:15 p.m.

CVE-2023-26100

2023-04-2112:15:07
CWE-79
web.nvd.nist.gov
5
flowmon
security
vulnerability
xss
code execution

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

45.9%

In Progress Flowmon before 12.2.0, an application endpoint failed to sanitize user-supplied input. A threat actor could leverage a reflected XSS vulnerability to execute arbitrary code within the context of a Flowmon user’s web browser.

Affected configurations

Nvd
Node
progressflowmon_osRange<12.2.0
VendorProductVersionCPE
progressflowmon_os*cpe:2.3:o:progress:flowmon_os:*:*:*:*:*:*:*:*

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

45.9%

Related for NVD:CVE-2023-26100