{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T17:43:13.692","vulnerabilities":[{"cve":{"id":"CVE-2018-12246","sourceIdentifier":"secure@symantec.com","published":"2018-10-22T19:29:00.267","lastModified":"2024-11-21T03:44:51.250","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Symantec Web Isolation (WI) 1.11 prior to 1.11.21 is susceptible to a reflected cross-site scripting (XSS) vulnerability. A remote attacker can target end users protected by WI with social engineering attacks using crafted URLs for legitimate web sites. A successful attack allows injecting malicious JavaScript code into the website's rendered copy running inside the end user's web browser. It does not allow injecting code into the real (isolated) copy of the website running on the WI Threat Isolation Engine."},{"lang":"es","value":"Symantec Web Isolation (WI) en versiones 1.11 anteriores a la 1.11.21 es susceptible a una vulnerabilidad Cross-Site Scripting (XSS) reflejado. Un atacante remoto puede apuntar hacia usuarios finales protegidos por WI con ataques de ingeniería social mediante URL manipuladas para sitios web legítimos. Un ataque exitoso permite la inyección de código JavaScript en la copia renderizada del sitio web que se ejecuta en el navegador web del usuario final. No permite la inyección de código en la copia real (aislada) del sitio web que se ejecuta en WI Threat Isolation Engine."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:web_isolation:*:*:*:*:*:*:*:*","versionStartIncluding":"1.11","versionEndExcluding":"1.11.21","matchCriteriaId":"CDCC38E0-753C-4580-A2F2-17389D7A1A6F"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105581","source":"secure@symantec.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://support.symantec.com/content/unifiedweb/en_US/article.SYMSA1464.html","source":"secure@symantec.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/105581","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://support.symantec.com/content/unifiedweb/en_US/article.SYMSA1464.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}