Show plain JSON{"acknowledgement": "This issue was discovered by Florian Weimer (Red Hat Product Security Team).", "affected_release": [{"advisory": "RHSA-2012:1278", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "condor-0:7.6.5-0.22.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1278", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "condor-wallaby-0:4.1.3-1.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1278", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "condor-wallaby-base-db-0:1.23-1.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1278", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "cumin-0:0.1.5444-3.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1278", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "sesame-0:1.0-4.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1278", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "wallaby-0:0.12.5-10.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "condor-0:7.6.5-0.22.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "condor-wallaby-0:4.1.3-1.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "condor-wallaby-base-db-0:1.23-1.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "cumin-0:0.1.5444-3.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "deltacloud-core-0:0.5.0-10.el6_2", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "libdeltacloud-0:0.9-1.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-daemons-0:1.1.4-2.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-eventmachine-0:0.12.10-7.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-fssm-0:0.2.7-1.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-haml-0:3.1.2-2.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-hpricot-0:0.8.4-2.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-json-0:1.4.6-10.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-maruku-0:0.6.0-4.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-mime-types-0:1.16-4.el6_0", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-mocha-0:0.9.7-4.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-net-ssh-0:2.0.23-6.el6_0", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-nokogiri-0:1.5.0-0.8.beta4.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-rack-1:1.3.0-2.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-rack-accept-0:0.4.3-6.el6_0", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-rack-test-0:0.6.1-1.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-rake-0:0.8.7-2.1.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-rest-client-0:1.6.1-2.el6_0", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygems-0:1.8.16-1.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-sass-0:3.1.4-4.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-sinatra-1:1.2.6-2.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-syntax-0:1.0.0-4.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-thin-0:1.2.11-3.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-tilt-0:1.3.2-3.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-yard-0:0.7.2-1.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "sesame-0:1.0-6.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}, {"advisory": "RHSA-2012:1281", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "wallaby-0:0.12.5-10.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-09-19T00:00:00Z"}], "bugzilla": {"description": "cumin: multiple XSS flaws", "id": "830243", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=830243"}, "csaw": false, "cvss": {"cvss_base_score": "4.3", "cvss_scoring_vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "status": "verified"}, "cwe": "CWE-79", "details": ["Multiple cross-site scripting (XSS) vulnerabilities in Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) \"error message displays\" or (2) \"in source HTML on certain pages.\""], "name": "CVE-2012-2683", "package_state": [{"cpe": "cpe:/a:redhat:enterprise_mrg:1", "fix_state": "Will not fix", "package_name": "cumin", "product_name": "Red Hat Enterprise MRG 1"}], "public_date": "2012-09-19T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2012-2683\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-2683"], "threat_severity": "Moderate"}