{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T11:46:59.967","vulnerabilities":[{"cve":{"id":"CVE-2020-7576","sourceIdentifier":"productcert@siemens.com","published":"2020-07-14T14:15:18.213","lastModified":"2024-11-21T05:37:24.447","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in Camstar Enterprise Platform (All versions), Opcenter Execution Core (All versions < V8.2), Opcenter Execution Core (V8.2). An authenticated user with the ability to create containers, packages or register defects could perform stored Cross-Site Scripting (XSS) attacks within the vulnerable software. The impact of this attack could result in the session cookies of legitimate users being stolen. Should the attacker gain access to these cookies, they could then hijack the session and perform arbitrary actions in the name of the victim."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en Camstar Enterprise Platform (Todas las versiones), Opcenter Execution Core (Todas las versiones anteriores a V8.2), Opcenter Execution Core (versión V8.2). Un usuario autenticado con la capacidad de crear contenedores, paquetes o registrar defectos podría llevar a cabo ataques de tipo Cross-Site Scripting (XSS) almacenado dentro del software vulnerable. El impacto de este ataque podría resultar en el robo de cookies de sesión de usuarios legítimos. Si atacante consigue acceso a estas cookies, podría secuestrar la sesión y llevar a cabo acciones arbitrarias en nombre de la víctima"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:opcenter_execution_core:*:*:*:*:*:*:*:*","versionEndExcluding":"8.2","matchCriteriaId":"9D09C829-E81B-474E-92C5-DFAC7BC65FD5"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-604937.pdf","source":"productcert@siemens.com","tags":["Vendor Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-604937.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}