4.3

CVE-2012-2903

Exploit
Multiple cross-site scripting (XSS) vulnerabilities in PHP Address Book 7.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) PATH_INFO to group.php, or the (2) target_language or (3) target_flag parameter to translate.php.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ChatelaoPhp Address Book Version <= 6.1.1
ChatelaoPhp Address Book Version1.0
ChatelaoPhp Address Book Version1.2
ChatelaoPhp Address Book Version2.0
ChatelaoPhp Address Book Version2.1
ChatelaoPhp Address Book Version2.1.1
ChatelaoPhp Address Book Version2.2
ChatelaoPhp Address Book Version2.3
ChatelaoPhp Address Book Version2.4
ChatelaoPhp Address Book Version2.6
ChatelaoPhp Address Book Version3.0
ChatelaoPhp Address Book Version3.1
ChatelaoPhp Address Book Version3.1.1
ChatelaoPhp Address Book Version3.1.2
ChatelaoPhp Address Book Version3.1.3
ChatelaoPhp Address Book Version3.1.4
ChatelaoPhp Address Book Version3.1.5
ChatelaoPhp Address Book Version3.1.6
ChatelaoPhp Address Book Version3.2
ChatelaoPhp Address Book Version3.2.1
ChatelaoPhp Address Book Version3.2.2
ChatelaoPhp Address Book Version3.2.3
ChatelaoPhp Address Book Version3.2.4
ChatelaoPhp Address Book Version3.2.5
ChatelaoPhp Address Book Version3.2.6
ChatelaoPhp Address Book Version3.2.7
ChatelaoPhp Address Book Version3.2.8
ChatelaoPhp Address Book Version3.2.9
ChatelaoPhp Address Book Version3.2.10
ChatelaoPhp Address Book Version3.2.11
ChatelaoPhp Address Book Version3.2.12
ChatelaoPhp Address Book Version3.2.13
ChatelaoPhp Address Book Version3.2.14
ChatelaoPhp Address Book Version3.3
ChatelaoPhp Address Book Version3.3.1
ChatelaoPhp Address Book Version3.3.2
ChatelaoPhp Address Book Version3.3.3
ChatelaoPhp Address Book Version3.3.4
ChatelaoPhp Address Book Version3.3.5
ChatelaoPhp Address Book Version3.3.6
ChatelaoPhp Address Book Version3.3.7
ChatelaoPhp Address Book Version3.3.8
ChatelaoPhp Address Book Version3.3.9
ChatelaoPhp Address Book Version3.3.10
ChatelaoPhp Address Book Version3.3.12
ChatelaoPhp Address Book Version3.3.13
ChatelaoPhp Address Book Version3.3.14
ChatelaoPhp Address Book Version3.3.15
ChatelaoPhp Address Book Version3.3.16
ChatelaoPhp Address Book Version3.3.17
ChatelaoPhp Address Book Version3.3.18
ChatelaoPhp Address Book Version3.4
ChatelaoPhp Address Book Version3.4.1
ChatelaoPhp Address Book Version3.4.2
ChatelaoPhp Address Book Version3.4.3
ChatelaoPhp Address Book Version3.4.4
ChatelaoPhp Address Book Version3.4.5
ChatelaoPhp Address Book Version3.4.6
ChatelaoPhp Address Book Version3.4.7
ChatelaoPhp Address Book Version3.4.8
ChatelaoPhp Address Book Version3.4.9
ChatelaoPhp Address Book Version4.0
ChatelaoPhp Address Book Version4.0.2
ChatelaoPhp Address Book Version4.1.1
ChatelaoPhp Address Book Version4.1.3
ChatelaoPhp Address Book Version4.1.4
ChatelaoPhp Address Book Version5.0
ChatelaoPhp Address Book Version5.0 Updatebeta
ChatelaoPhp Address Book Version5.1
ChatelaoPhp Address Book Version5.2
ChatelaoPhp Address Book Version5.3
ChatelaoPhp Address Book Version5.4
ChatelaoPhp Address Book Version5.4.1
ChatelaoPhp Address Book Version5.4.2
ChatelaoPhp Address Book Version5.4.3
ChatelaoPhp Address Book Version5.4.4
ChatelaoPhp Address Book Version5.4.5
ChatelaoPhp Address Book Version5.4.6
ChatelaoPhp Address Book Version5.4.7
ChatelaoPhp Address Book Version5.4.9
ChatelaoPhp Address Book Version5.5
ChatelaoPhp Address Book Version5.6
ChatelaoPhp Address Book Version5.7
ChatelaoPhp Address Book Version5.7.1
ChatelaoPhp Address Book Version5.7.2
ChatelaoPhp Address Book Version5.7.3
ChatelaoPhp Address Book Version5.7.4
ChatelaoPhp Address Book Version5.7.5
ChatelaoPhp Address Book Version5.8.1
ChatelaoPhp Address Book Version6.0
ChatelaoPhp Address Book Version6.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.5% 0.807
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.