CVE-2019-15652

The web interface for NSSLGlobal SatLink VSAT Modem Unit (VMU) devices before 18.1.0 doesn't properly sanitize input for error messages, leading to the ability to inject client-side code.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:nssglobal:vmu_software:*:*:*:*:*:*:*:*
OR cpe:2.3:h:nssglobal:satlink_2000:-:*:*:*:*:*:*:*
cpe:2.3:h:nssglobal:satlink_2900:-:*:*:*:*:*:*:*
cpe:2.3:h:nssglobal:satlink_2910:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:29

Type Values Removed Values Added
References () https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2019-15652-satlink-vsat-vulnerabilities/ - Third Party Advisory () https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2019-15652-satlink-vsat-vulnerabilities/ - Third Party Advisory
References () https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26455 - Exploit, Third Party Advisory () https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26455 - Exploit, Third Party Advisory

Information

Published : 2019-11-22 18:15

Updated : 2024-11-21 04:29


NVD link : CVE-2019-15652

Mitre link : CVE-2019-15652

CVE.ORG link : CVE-2019-15652


JSON object : View

Products Affected

nssglobal

  • satlink_2910
  • satlink_2000
  • vmu_software
  • satlink_2900
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')