CVE-2016-15022
low-risk
Published 2023-01-29
A vulnerability was found in mosbth cimage up to 0.7.18. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file check_system.php. The manipulation of the argument $_SERVER['SERVER_SOFTWARE'] leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 0.7.19 is able to address this issue. The patch is named 401478c8393989836beeddfeac5ce44570af162b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-219715.
Do I need to act?
-
0.30% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
2
CVSS 2.0/10
Low
NETWORK
/ HIGH complexity
Affected Products (1)
Cimage
Affected Vendors
References (8)
Release Notes
https://github.com/mosbth/cimage/releases/tag/v0.7.19
Third Party Advisory
https://vuldb.com/?ctiid.219715
Third Party Advisory
https://vuldb.com/?id.219715
Release Notes
https://github.com/mosbth/cimage/releases/tag/v0.7.19
Third Party Advisory
https://vuldb.com/?ctiid.219715
Third Party Advisory
https://vuldb.com/?id.219715
14
/ 100
low-risk
Severity
8/34 · Low
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal