Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xcHI3LTVtNjMtaHEyY84AAWKW
Improper Neutralization of Input During Web Page Generation in JAMon
Multiple cross-site scripting (XSS) vulnerabilities in JAMon (Java Application Monitor) 2.7 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) listenertype or (2) currentlistener parameter to mondetail.jsp or ArraySQL parameter to (3) mondetail.jsp, (4) jamonadmin.jsp, (5) sql.jsp, or (6) exceptions.jsp.
Permalink: https://github.com/advisories/GHSA-qpr7-5m63-hq2cJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xcHI3LTVtNjMtaHEyY84AAWKW
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: over 1 year ago
Identifiers: GHSA-qpr7-5m63-hq2c, CVE-2013-6235
References:
- https://nvd.nist.gov/vuln/detail/CVE-2013-6235
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90699
- http://osvdb.org/102570
- http://osvdb.org/102571
- http://osvdb.org/102572
- http://osvdb.org/102573
- http://packetstormsecurity.com/files/124933
- http://seclists.org/fulldisclosure/2014/Jan/164
- http://www.securityfocus.com/archive/1/530877/100/0/threaded
- https://github.com/advisories/GHSA-qpr7-5m63-hq2c
Affected Packages
maven:com.jamonapi:jamon
Dependent packages: 65Dependent repositories: 293
Downloads:
Affected Version Ranges: < 2.80
Fixed in: 2.80
All affected versions:
All unaffected versions: