Vulnerability Details CVE-2015-1565
Cross-site scripting (XSS) vulnerability in the online help in Hitachi Device Manager, Tiered Storage Manager, Replication Manager, and Global Link Manager before 8.1.2-00, and Compute Systems Manager before 7.6.1-08 and 8.x before 8.1.2-00, as used in Hitachi Command Suite, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 52.6%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2015-1565
-
cpe:2.3:a:hitachi:compute_systems_manager:7.6.1
-
cpe:2.3:a:hitachi:compute_systems_manager:8.0.0
-
cpe:2.3:a:hitachi:compute_systems_manager:8.1.0
-
cpe:2.3:a:hitachi:compute_systems_manager:8.1.1
-
cpe:2.3:a:hitachi:device_manager:7.0.0
-
cpe:2.3:a:hitachi:device_manager:7.0.0-00
-
cpe:2.3:a:hitachi:device_manager:8.1.1
-
cpe:2.3:a:hitachi:global_link_manager:8.1.1
-
cpe:2.3:a:hitachi:replication_manager:7.0.0
-
cpe:2.3:a:hitachi:replication_manager:8.1.1
-
cpe:2.3:a:hitachi:tiered_storage_manager:7.0.0
-
cpe:2.3:a:hitachi:tiered_storage_manager:8.1.1
-
cpe:2.3:o:microsoft:windows:-
-
cpe:2.3:o:microsoft:windows:1.0
-
cpe:2.3:o:microsoft:windows:2.0
-
cpe:2.3:o:microsoft:windows:2000
-
cpe:2.3:o:microsoft:windows:3.0
-
cpe:2.3:o:microsoft:windows:3.1
-
cpe:2.3:o:microsoft:windows:3.11
-
cpe:2.3:o:microsoft:windows:server_2008
-
cpe:2.3:o:microsoft:windows:vista
-
cpe:2.3:o:novell:opensuse:-
-
cpe:2.3:o:novell:opensuse:10.2
-
cpe:2.3:o:novell:opensuse:10.3
-
cpe:2.3:o:novell:opensuse:11.0
-
cpe:2.3:o:novell:opensuse:11.1
-
cpe:2.3:o:novell:opensuse:11.2
-
cpe:2.3:o:novell:opensuse:11.3
-
cpe:2.3:o:novell:opensuse:11.4
-
cpe:2.3:o:novell:opensuse:12.1
-
cpe:2.3:o:novell:opensuse:12.2
-
cpe:2.3:o:novell:opensuse:12.3
-
cpe:2.3:o:novell:opensuse:13.1
-
cpe:2.3:o:novell:opensuse:13.2
-
cpe:2.3:o:redhat:enterprise_linux:-
-
cpe:2.3:o:redhat:enterprise_linux:2.1
-
cpe:2.3:o:redhat:enterprise_linux:3
-
cpe:2.3:o:redhat:enterprise_linux:3.0
-
cpe:2.3:o:redhat:enterprise_linux:4
-
cpe:2.3:o:redhat:enterprise_linux:4.0
-
cpe:2.3:o:redhat:enterprise_linux:4.4
-
cpe:2.3:o:redhat:enterprise_linux:4.5
-
cpe:2.3:o:redhat:enterprise_linux:5
-
cpe:2.3:o:redhat:enterprise_linux:5.0
-
cpe:2.3:o:redhat:enterprise_linux:5.1.0
-
cpe:2.3:o:redhat:enterprise_linux:5.11
-
cpe:2.3:o:redhat:enterprise_linux:5.4
-
cpe:2.3:o:redhat:enterprise_linux:6
-
cpe:2.3:o:redhat:enterprise_linux:6.0
-
cpe:2.3:o:redhat:enterprise_linux:6.1
-
cpe:2.3:o:redhat:enterprise_linux:6.10
-
cpe:2.3:o:redhat:enterprise_linux:6.2
-
cpe:2.3:o:redhat:enterprise_linux:6.3
-
cpe:2.3:o:redhat:enterprise_linux:6.4
-
cpe:2.3:o:redhat:enterprise_linux:6.5
-
cpe:2.3:o:redhat:enterprise_linux:6.6
-
cpe:2.3:o:redhat:enterprise_linux:6.7
-
cpe:2.3:o:redhat:enterprise_linux:6.8
-
cpe:2.3:o:redhat:enterprise_linux:6.9
-
cpe:2.3:o:redhat:enterprise_linux:7.0
-
cpe:2.3:o:redhat:enterprise_linux:7.1
-
cpe:2.3:o:redhat:enterprise_linux:7.2
-
cpe:2.3:o:redhat:enterprise_linux:7.3
-
cpe:2.3:o:redhat:enterprise_linux:7.4
-
cpe:2.3:o:redhat:enterprise_linux:7.5
-
cpe:2.3:o:redhat:enterprise_linux:7.6
-
cpe:2.3:o:redhat:enterprise_linux:7.7
-
cpe:2.3:o:redhat:enterprise_linux:7.8
-
cpe:2.3:o:redhat:enterprise_linux:7.9
-
cpe:2.3:o:redhat:enterprise_linux:8.0
-
cpe:2.3:o:redhat:enterprise_linux:8.1
-
cpe:2.3:o:redhat:enterprise_linux:8.3
-
cpe:2.3:o:redhat:enterprise_linux:8.3.0
-
cpe:2.3:o:redhat:enterprise_linux:8.4
-
cpe:2.3:o:redhat:enterprise_linux:8.5.0
-
cpe:2.3:o:redhat:enterprise_linux:8.6
-
cpe:2.3:o:redhat:enterprise_linux:8.7
-
cpe:2.3:o:redhat:enterprise_linux:9.0
-
cpe:2.3:o:redhat:enterprise_linux:9.1
-
cpe:2.3:o:redhat:enterprise_linux:as_3
-
cpe:2.3:o:redhat:enterprise_linux:as_4
-
cpe:2.3:o:redhat:enterprise_linux:es_3
-
cpe:2.3:o:redhat:enterprise_linux:es_4
-
cpe:2.3:o:redhat:enterprise_linux:ws_3
-
cpe:2.3:o:redhat:enterprise_linux:ws_4