{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T05:30:47.102","vulnerabilities":[{"cve":{"id":"CVE-2014-3491","sourceIdentifier":"secalert@redhat.com","published":"2014-07-01T16:55:02.527","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in Foreman before 1.4.5 and 1.5.x before 1.5.1 allows remote attackers to inject arbitrary web script or HTML via the Name field to the New Host groups page, related to create, update, and destroy notification boxes."},{"lang":"es","value":"Vulnerabilidad de XSS en Foreman anterior a 1.4.5 y 1.5.x anterior a 1.5.1 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del campo de Nombre en la página de grupos del anfitrión nuevo, relacionado con crear, actualizar y destruir casillas de notificación."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*","versionEndIncluding":"1.4.4","matchCriteriaId":"34ABC0F5-090E-4BD1-9B12-11975FAD872F"},{"vulnerable":true,"criteria":"cpe:2.3:a:theforeman:foreman:1.4.0:*:*:*:*:*:*:*","matchCriteriaId":"E85D7723-0DF9-43C4-A0FF-5C2835C98DEC"},{"vulnerable":true,"criteria":"cpe:2.3:a:theforeman:foreman:1.4.1:*:*:*:*:*:*:*","matchCriteriaId":"29BA1DF0-D6D0-4D3D-9509-55AB11D2D336"},{"vulnerable":true,"criteria":"cpe:2.3:a:theforeman:foreman:1.4.2:*:*:*:*:*:*:*","matchCriteriaId":"949634A2-38B2-4BBE-B73E-0D3FC34A7728"},{"vulnerable":true,"criteria":"cpe:2.3:a:theforeman:foreman:1.4.3:*:*:*:*:*:*:*","matchCriteriaId":"D7A2CC92-CC4D-4CA7-9979-7414575F0E0C"},{"vulnerable":true,"criteria":"cpe:2.3:a:theforeman:foreman:1.5.0:*:*:*:*:*:*:*","matchCriteriaId":"0142030F-4787-49ED-BD28-DCF6B08B2B65"}]}]}],"references":[{"url":"http://projects.theforeman.org/issues/5881","source":"secalert@redhat.com","tags":["Exploit","Patch"]},{"url":"http://projects.theforeman.org/issues/5881","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]}]}}]}