CVE-2009-1937
Published Jun 5, 2009
Last updated 6 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in the comment posting feature in LightNEasy 2.2.1 "no database" (aka flat) and 2.2.2 SQLite allows remote attackers to inject arbitrary web script or HTML via the (1) commentname (aka Author), (2) commentemail (aka Email), and (3) commentmessage (aka Comment) parameters. NOTE: some of these details are obtained from third party information.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:lightneasy:lightneasy:2.2.1:*:no_database:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4B08A25-69F3-4396-B9B6-37BB0B2B7DED" }, { "criteria": "cpe:2.3:a:lightneasy:lightneasy:2.2.2:*:sqlite:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBFCAB31-D17F-4C40-A81B-66B0C7500EAF" } ], "operator": "OR" } ] } ]