{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T02:28:13.993","vulnerabilities":[{"cve":{"id":"CVE-2018-1000557","sourceIdentifier":"cve@mitre.org","published":"2018-06-26T16:29:02.820","lastModified":"2024-11-21T03:40:11.530","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"OCS Inventory OCS Inventory NG version ocsreports 2.4 contains a Cross Site Scripting (XSS) vulnerability in login form and search functionality that can result in An attacker is able to execute arbitrary (javascript) code within a victims' browser. This attack appear to be exploitable via Victim must open a crafted link to the application. This vulnerability appears to have been fixed in ocsreports 2.4.1."},{"lang":"es","value":"OCS Inventory OCS Inventory NG version ocsreports 2.4 contiene una vulnerabilidad Cross-Site Scripting (XSS) en el formulario de inicio de sesión y la función search que puede resultar en que un atacante podría ejecutar código arbitrario (JavaScript) en el navegador de las víctimas. Este ataque parece ser explotable mediante una víctima que abra un enlace especialmente manipulado a la aplicación. La vulnerabilidad parece haber sido solucionada en ocsreports 2.4.1."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ocsinventory-ng:ocsinventory_ng:2.4:*:*:*:*:*:*:*","matchCriteriaId":"B99848E4-225D-4B9F-B665-C80E0CC9F3DA"}]}]}],"references":[{"url":"https://www.ocsinventory-ng.org/en/ocs-inventory-server-2-4-1-has-been-released/","source":"cve@mitre.org","tags":["Release Notes","Vendor Advisory"]},{"url":"https://www.secuvera.de/advisories/secuvera-SA-2017-03.txt","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.ocsinventory-ng.org/en/ocs-inventory-server-2-4-1-has-been-released/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]},{"url":"https://www.secuvera.de/advisories/secuvera-SA-2017-03.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}