CVE-2011-3598
Published Oct 8, 2011
Last updated 10 years ago
Overview
- Description
- Multiple cross-site scripting (XSS) vulnerabilities in phpPgAdmin before 5.0.3 allow remote attackers to inject arbitrary web script or HTML via (1) a web page title, related to classes/Misc.php; or the (2) return_url or (3) return_desc parameter to display.php.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B7A7773-6590-4486-A2F1-5B4D699FE779", "versionEndIncluding": "5.0.2" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B268F49-4F3A-4D05-8079-05EB75E1AE8C" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F2CCA02-7AE3-4CF8-A514-ABCC16CDF435" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E23D4530-0B63-459C-B7F2-84F5866CCA04" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47A293B3-3E81-4B7E-8D24-EC1B57C2CD83" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1893B7A4-D303-4DA7-B3C5-264413A5D473" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "974D3D46-7DEB-45E5-B615-D95C2355F6DC" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:3.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A913E0DA-8076-4850-B218-F65C8A86F370" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81B74FF6-8280-4A14-B988-F58FB7915232" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:3.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A673AB66-EE9C-4873-873B-72FA25F3ADB1" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:3.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45DAC8C2-1469-41EA-B155-A9F24A46DD56" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEA8E6BB-8BEB-4FDF-8935-EACED78E7EA4" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:4.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72BD7FEB-B23E-43BE-8682-AD70C4D7BE28" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:4.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D79FAC8-65ED-461C-9FFF-5010D8BAC6BB" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:4.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7330FE3A-45FF-49D4-A6A6-4305A112E1D2" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D802197-3B55-478E-8DB9-7ADAD09A9060" }, { "criteria": "cpe:2.3:a:phppgadmin:phppgadmin:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFD50410-0906-4FE6-9BB2-5757874E5381" } ], "operator": "OR" } ] } ]