{"id":"CVE-2017-6393","details":"An issue was discovered in NagVis 1.9b12. The vulnerability exists due to insufficient filtration of user-supplied data passed to the \"nagvis-master/share/userfiles/gadgets/std_table.php\" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.","modified":"2026-03-12T22:39:36.223489Z","published":"2017-03-02T06:59:00.387Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/96537"},{"type":"FIX","url":"https://github.com/NagVis/nagvis/issues/91"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nagvis/nagvis","events":[{"introduced":"0"},{"last_affected":"e4d9e29b140c5125b9eb5dd4bc67338cde4fbbd9"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.9-b12"}]}}],"versions":["nagvis-1.0.0","nagvis-1.1.0","nagvis-1.1.1","nagvis-1.1.2","nagvis-1.2.0","nagvis-1.2.1","nagvis-1.2.2","nagvis-1.3.0","nagvis-1.4.0","nagvis-1.4.1","nagvis-1.5.0","nagvis-1.5.1","nagvis-1.5.2","nagvis-1.5.3","nagvis-1.5.4","nagvis-1.5.5","nagvis-1.5b1","nagvis-1.5b2","nagvis-1.5b3","nagvis-1.5b4","nagvis-1.5rc1","nagvis-1.5rc2","nagvis-1.5rc3","nagvis-1.6.0","nagvis-1.6.1","nagvis-1.6.2","nagvis-1.6.3","nagvis-1.6.4","nagvis-1.6b1","nagvis-1.6b2","nagvis-1.6b3","nagvis-1.6rc1","nagvis-1.6rc2","nagvis-1.6rc3","nagvis-1.6rc4","nagvis-1.7.0","nagvis-1.7.1","nagvis-1.7.2","nagvis-1.7.3","nagvis-1.7.4","nagvis-1.7.5","nagvis-1.7.6","nagvis-1.7.7","nagvis-1.7.8","nagvis-1.7.9","nagvis-1.7b1","nagvis-1.7b2","nagvis-1.7b3","nagvis-1.8.0","nagvis-1.8b1","nagvis-1.8b2","nagvis-1.8b3","nagvis-1.8b4","nagvis-1.8b5","nagvis-1.8b6","nagvis-1.8b7","nagvis-1.8rc1","nagvis-1.8rc2","nagvis-1.8rc3","nagvis-1.9a1","nagvis-1.9b1","nagvis-1.9b10","nagvis-1.9b11","nagvis-1.9b12","nagvis-1.9b2","nagvis-1.9b3","nagvis-1.9b4","nagvis-1.9b5","nagvis-1.9b6","nagvis-1.9b7","nagvis-1.9b8","nagvis-1.9b9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-6393.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}