Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pjx5-3639-8fm2

Опубликовано: 04 фев. 2026
Источник: github
Github: Не прошло ревью
CVSS3: 4.8

Описание

A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against users of the interface of an affected system.

This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious code into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker must have valid administrative credentials.

A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against users of the interface of an affected system.

This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious code into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker must have valid administrative credentials.

EPSS

Процентиль: 8%
0.00029
Низкий

4.8 Medium

CVSS3

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 4.8
nvd
3 дня назад

A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against users of the interface of an affected system. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious code into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker must have valid administrative credentials.

CVSS3: 4.8
debian
3 дня назад

A vulnerability in the web-based management interface of Cisco Prime I ...

EPSS

Процентиль: 8%
0.00029
Низкий

4.8 Medium

CVSS3

Дефекты

CWE-798