{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T02:32:25.385","vulnerabilities":[{"cve":{"id":"CVE-2012-4939","sourceIdentifier":"cret@cert.org","published":"2012-10-31T19:55:00.950","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in IPAMSummaryView.aspx in the IPAM web interface before 3.0-HotFix1 in SolarWinds Orion Network Performance Monitor might allow remote attackers to inject arbitrary web script or HTML via the \"Search for an IP address\" field."},{"lang":"es","value":"Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en la IPAMSummaryView.aspx en el interfaz web IPAM anterior a v3.0-HotFix1 en SolarWinds Orion Network Performance Monitor puede permitir a un  atacante remoto inyectar código script o HTML de su elección a través del campo \"Search for an IP address\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:ip_address_manager_web_interface:*:*:*:*:*:*:*:*","versionEndIncluding":"3.0","matchCriteriaId":"651B667A-F5D1-4B6C-91C5-7EE69D28AB0A"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:orion_network_performance_monitor:-:*:*:*:*:*:*:*","matchCriteriaId":"0433752B-FCEB-4313-A137-3F2E970D8BF0"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:orion_network_performance_monitor:10.0:*:*:*:*:*:*:*","matchCriteriaId":"F8C131A4-FE0E-4BE7-A2B4-70518469316D"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:orion_network_performance_monitor:10.1:*:*:*:*:*:*:*","matchCriteriaId":"CAA52FCF-76A8-4738-B14E-27156757677D"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:orion_network_performance_monitor:10.1.13.0:*:*:*:*:*:*:*","matchCriteriaId":"5C087ECB-98D9-4ED7-A431-4254BAF4E5A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:orion_network_performance_monitor:10.2:*:*:*:*:*:*:*","matchCriteriaId":"27A83D40-5923-4D79-B03B-4BD0F72D9997"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:orion_network_performance_monitor:10.2.1:*:*:*:*:*:*:*","matchCriteriaId":"3D90725C-2B9F-4214-A7CD-7B6D31578835"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:orion_network_performance_monitor:10.2.2:*:*:*:*:*:*:*","matchCriteriaId":"0CBA6127-2A33-40E7-A28A-502DE8CB96A9"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:orion_network_performance_monitor:10.3:*:*:*:*:*:*:*","matchCriteriaId":"48202B60-AAB5-457C-A24E-BE8C5B18E3A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:orion_network_performance_monitor:10.3.1:*:*:*:*:*:*:*","matchCriteriaId":"B0F22FA7-C52B-4DF7-BF53-1C5671840625"}]}]}],"references":[{"url":"http://www.kb.cert.org/vuls/id/203844","source":"cret@cert.org","tags":["Exploit","US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/203844","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","US Government Resource"]}]}}]}