Vulnerability Details : CVE-2008-5719
Cross-site scripting (XSS) vulnerability in Hitachi Groupmax Web Workflow SDK Set for Active Server Pages before 06-52-/C and Hitachi Groupmax Workflow - Development Kit for Active Server Pages before 06-52-/A allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2008-5719
- Hitachi » Groupmax Web Workflow Sdk Set For Active Server PagesVersions up to, including, (<=) 06-52_bcpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:*:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:06-52:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:06-51:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-20:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-20_c:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-11_b:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-11_a:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-00_b:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-00_a:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:06-52_a:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:06-01:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:06-00:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:06-03:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:06-02:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-11:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-11_e:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-10_a:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-00:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:03-10_c:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:03-10_b:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-11_d:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-11_c:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-00_d:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-00_c:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:03-10_a:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:06-50:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:06-03_a:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-20_b:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-20_a:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-10:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-10_c:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:05-10_b:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:03-10:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_web_workflow_sdk_set_for_active_server_pages:03-10_d:*:*:*:*:*:*:*
- Hitachi » Groupmax Workflow To Development Kit For Active Server PagesVersions up to, including, (<=) 06-52cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:*:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:3-10_a:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:3-10_b:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:05-00:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:05-00_b:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:05-00_a:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:06-51:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:05-11:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:05-11_a:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:06-02:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:06-03:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:3-10:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:05-10:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:05-10_a:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:06-03_a:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:06-50:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:05-20:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:05-20_a:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:06-00:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:groupmax_workflow_to_development_kit_for_active_server_pages:06-01:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-5719
0.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 52 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-5719
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2008-5719
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-5719
Jump to