[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-17512":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":47,"name":48,"published":49,"updated":34},17512,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":35,"risk_description":36,"public_description":37,"public_recommendation":38,"recommendation":34,"references":39,"cvssv3":41,"epss_score":42,"epss_percentile":43,"cve":44,"in_cisa_catalog":46,"date":34,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"medium","If an organization or location is created with a name containing HTML, then the administrator-only Settings page will render the HTML as part of a dropdown menu. This may permit a stored XSS attack if an organization/location with HTML in the name is created, when an administrator attempts to change the default organization/location settings.","Foreman is prone to a cross-site scripting (XSS) vulnerability.","Update to version 1.13.0 or later.",[40],"https://theforeman.org/security.html#2016-8639",5.4,0.00582,0.689,[45],"CVE-2016-8639",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.106416","Foreman 1.11.x \u003C 1.13.0 XSS Vulnerability","2018-01-02T00:00:00Z"]