{"api_version":"1","generated_at":"2026-05-06T21:27:07+00:00","cve":"CVE-2014-5464","urls":{"html":"https://cve.report/CVE-2014-5464","api":"https://cve.report/api/cve/CVE-2014-5464.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2014-5464","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2014-5464"},"summary":{"title":"CVE-2014-5464","description":"Cross-site scripting (XSS) vulnerability in the nDPI traffic classification library in ntopng (aka ntop) before 1.2.1 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2014-09-08 14:55:00","updated_at":"2018-10-09 19:50:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"http://www.ntop.org/ndpi/released-ndpi-1-5-1-and-ntopng-1-2-1/","name":"http://www.ntop.org/ndpi/released-ndpi-1-5-1-and-ntopng-1-2-1/","refsource":"CONFIRM","tags":[],"title":"Released nDPI 1.5.1 and ntopng 1.2.1","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.exploit-db.com/exploits/34419","name":"34419","refsource":"EXPLOIT-DB","tags":["Exploit"],"title":"ntopng 1.2.0 - XSS Injection","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://osvdb.org/show/osvdb/110437","name":"110437","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2014/Aug/65","name":"20140825 ntopng 1.2.0 XSS injection using monitored network traffic","refsource":"FULLDISC","tags":["Exploit"],"title":"Full Disclosure: ntopng 1.2.0 XSS injection using monitored network traffic","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/60096","name":"60096","refsource":"SECUNIA","tags":[],"title":"Security Advisory SA60096 - ntopng Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2014/Sep/28","name":"20140909 Re: ntopng 1.2.0 XSS injection using monitored network traffic","refsource":"FULLDISC","tags":["Exploit"],"title":"Full Disclosure: Re: ntopng 1.2.0 XSS injection using monitored network traffic","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/127995/ntopng-1.2.0-Cross-Site-Scripting.html","name":"http://packetstormsecurity.com/files/127995/ntopng-1.2.0-Cross-Site-Scripting.html","refsource":"MISC","tags":["Exploit"],"title":"ntopng 1.2.0 Cross Site Scripting ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/69385","name":"69385","refsource":"BID","tags":[],"title":"ntopng HTTP Host Request Header Lines Multiple HTML Injection Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securityfocus.com/archive/1/533222/100/0/threaded","name":"20140825 ntopng 1.2.0 XSS injection using monitored network traffic","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95461","name":"ntopng-httpheader-xss(95461)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/533332/100/0/threaded","name":"20140903 Re: ntopng 1.2.0 XSS injection using monitored network traffic","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2014/Sep/22","name":"20140903 Re: ntopng 1.2.0 XSS injection using monitored network traffic","refsource":"FULLDISC","tags":["Exploit"],"title":"Full Disclosure: Re: ntopng 1.2.0 XSS injection using monitored network traffic","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2014-5464","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5464","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2014","cve_id":"5464","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntop","cpe5":"ntopng","cpe6":"1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"5464","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntop","cpe5":"ntopng","cpe6":"1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"5464","vulnerable":"1","versionEndIncluding":"1.2.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntop","cpe5":"ntopng","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2014-5464","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Cross-site scripting (XSS) vulnerability in the nDPI traffic classification library in ntopng (aka ntop) before 1.2.1 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20140903 Re: ntopng 1.2.0 XSS injection using monitored network traffic","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/533332/100/0/threaded"},{"name":"http://packetstormsecurity.com/files/127995/ntopng-1.2.0-Cross-Site-Scripting.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/127995/ntopng-1.2.0-Cross-Site-Scripting.html"},{"name":"http://www.ntop.org/ndpi/released-ndpi-1-5-1-and-ntopng-1-2-1/","refsource":"CONFIRM","url":"http://www.ntop.org/ndpi/released-ndpi-1-5-1-and-ntopng-1-2-1/"},{"name":"20140909 Re: ntopng 1.2.0 XSS injection using monitored network traffic","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2014/Sep/28"},{"name":"ntopng-httpheader-xss(95461)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95461"},{"name":"60096","refsource":"SECUNIA","url":"http://secunia.com/advisories/60096"},{"name":"110437","refsource":"OSVDB","url":"http://osvdb.org/show/osvdb/110437"},{"name":"20140825 ntopng 1.2.0 XSS injection using monitored network traffic","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2014/Aug/65"},{"name":"20140903 Re: ntopng 1.2.0 XSS injection using monitored network traffic","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2014/Sep/22"},{"name":"34419","refsource":"EXPLOIT-DB","url":"http://www.exploit-db.com/exploits/34419"},{"name":"69385","refsource":"BID","url":"http://www.securityfocus.com/bid/69385"},{"name":"20140825 ntopng 1.2.0 XSS injection using monitored network traffic","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/533222/100/0/threaded"}]}},"nvd":{"publishedDate":"2014-09-08 14:55:00","lastModifiedDate":"2018-10-09 19:50:00","problem_types":["CWE-79"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntop:ntopng:1.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntop:ntopng:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2014","CveId":"5464","Ordinal":"72458","Title":"CVE-2014-5464","CVE":"CVE-2014-5464","Year":"2014"},"notes":[{"CveYear":"2014","CveId":"5464","Ordinal":"1","NoteData":"Cross-site scripting (XSS) vulnerability in the nDPI traffic classification library in ntopng (aka ntop) before 1.2.1 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header.","Type":"Description","Title":null},{"CveYear":"2014","CveId":"5464","Ordinal":"2","NoteData":"2014-09-08","Type":"Other","Title":"Published"},{"CveYear":"2014","CveId":"5464","Ordinal":"3","NoteData":"2018-10-09","Type":"Other","Title":"Modified"}]}}}