Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:omron:ns_series_system_program_firmware:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "8246BB5A-986B-4AA0-B3A2-645976E8E7AF", "vulnerable": true}, {"criteria": "cpe:2.3:o:omron:ns_series_system_program_firmware:8.68:*:*:*:*:*:*:*", "matchCriteriaId": "58C930D1-BA9F-4643-8321-B160A018C5D9", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:omron:ns10_hmi_terminal:-:*:*:*:*:*:*:*", "matchCriteriaId": "31B221BA-8C11-41E2-836A-3007022AB5DE", "vulnerable": true}, {"criteria": "cpe:2.3:h:omron:ns12_hmi_terminal:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E804153-AE32-4FE1-920F-FF648A2B2FE0", "vulnerable": true}, {"criteria": "cpe:2.3:h:omron:ns15_hmi_terminal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F78DF368-D063-42D2-ABD4-ABD63BF22842", "vulnerable": true}, {"criteria": "cpe:2.3:h:omron:ns5_hmi_terminal:-:*:*:*:*:*:*:*", "matchCriteriaId": "076C5660-3EBF-4318-B3C6-BF28596EB99E", "vulnerable": true}, {"criteria": "cpe:2.3:h:omron:ns8_hmi_terminal:-:*:*:*:*:*:*:*", "matchCriteriaId": "112E9FC7-96BB-4E5F-8697-8E0E48A80914", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to inject arbitrary web script or HTML via crafted data."}, {"lang": "es", "value": "Vulnerabilidad de XSS en la aplicaci\u00f3n web en los terminales HMI Omron NS5, NS8, NS10, NS12 y NS15 8.1xx hasta 8.68x permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de datos manipulados."}], "id": "CVE-2014-2370", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2014-07-24T14:55:07.317", "references": [{"source": "ics-cert@hq.dhs.gov", "tags": ["Third Party Advisory", "US Government Resource"], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-203-01"}, {"source": "ics-cert@hq.dhs.gov", "url": "http://www.securityfocus.com/bid/68836"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "US Government Resource"], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-203-01"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/68836"}], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}