Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in JAMon (Java Application Monitor) 2.7 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) listenertype or (2) currentlistener parameter to mondetail.jsp or ArraySQL parameter to (3) mondetail.jsp, (4) jamonadmin.jsp, (5) sql.jsp, or (6) exceptions.jsp.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Steve Souza | Java Application Monitor | <= 2.7 |
Related Weaknesses (CWE)
References
- http://osvdb.org/102570
- http://osvdb.org/102571
- http://osvdb.org/102572
- http://osvdb.org/102573
- http://packetstormsecurity.com/files/124933Exploit
- http://seclists.org/fulldisclosure/2014/Jan/164Exploit
- http://www.securityfocus.com/archive/1/530877/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90699
- http://osvdb.org/102570
- http://osvdb.org/102571
- http://osvdb.org/102572
- http://osvdb.org/102573
- http://packetstormsecurity.com/files/124933Exploit
- http://seclists.org/fulldisclosure/2014/Jan/164Exploit
- http://www.securityfocus.com/archive/1/530877/100/0/threaded
FAQ
What is CVE-2013-6235?
CVE-2013-6235 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Multiple cross-site scripting (XSS) vulnerabilities in JAMon (Java Application Monitor) 2.7 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) listenertype or (2) cu...
How severe is CVE-2013-6235?
CVE-2013-6235 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6235?
Check the references section above for vendor advisories and patch information. Affected products include: Steve Souza Java Application Monitor.