Vulnerability Details CVE-2022-26483
An issue was discovered in Veritas InfoScale Operations Manager (VIOM) before 7.4.2 Patch 600 and 8.x before 8.0.0 Patch 100. A reflected cross-site scripting (XSS) vulnerability in admin/cgi-bin/listdir.pl allows authenticated remote administrators to inject arbitrary web script or HTML into an HTTP GET parameter (which reflect the user input without sanitization).
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 44.6%
CVSS Severity
CVSS v3 Score 4.8
CVSS v2 Score 3.5
Products affected by CVE-2022-26483
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.0.0
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.0.0.101
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.0.0.103
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.0.0.300a
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.0.0.400
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.0.0.500
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.1
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.1.0.100
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.1.0.200
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.1.0.300
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.1.0.400
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.1.0.500
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.1.0.600
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.1.0.700
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.1.0.800
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.2
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.2.0.100
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.2.0.200
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.2.0.300
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.3
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.3.0.100
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.3.0.200
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.3.0.300
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.3.1
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.3.1.100
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.3.1.200
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.3.1.300
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.3.1.400
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.3.1.500
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.3.1.600
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.3.1.700
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.3.1.800
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.0.0
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.0.100
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.0.200
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.0.300
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.0.400
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.0.500
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.0.600
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.0.700
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.0.800
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.0.900
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.2
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.2.100
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.2.200
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.2.300
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.2.400
-
cpe:2.3:a:veritas:infoscale_operations_manager:7.4.2.500
-
cpe:2.3:a:veritas:infoscale_operations_manager:8.0.0