CVE-2013-1937
Published Apr 16, 2013
Last updated 3 months ago
Overview
- Description
- Multiple cross-site scripting (XSS) vulnerabilities in tbl_gis_visualization.php in phpMyAdmin 3.5.x before 3.5.8 might allow remote attackers to inject arbitrary web script or HTML via the (1) visualizationSettings[width] or (2) visualizationSettings[height] parameter. NOTE: a third party reports that this is "not exploitable.
- Source
- secalert@redhat.com
- NVD status
- Modified
- CNA Tags
- disputed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8256D77D-B4D1-4D2C-8F49-D080B805F238", "versionEndIncluding": "3.5.8" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2577DB75-9893-4496-B9B8-22F4D7C70D8B" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BBC76AB-567B-4081-8520-D4BB2211CA91" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDFD7186-12C3-4FA6-951E-288063262EAE" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4E23EA5-8FD8-441A-8CB6-F1E77AA0D73B" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5FE1328-F2E1-45C8-80ED-0560DAB666EE" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC675B47-0373-442E-9BCD-35D79355073C" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96E2C613-B1E9-4DB5-AA7D-165E5093452F" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B0E7188-E3DE-4A9C-9B9B-31E7276F74AF" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E6D5B72-CA57-4054-B002-56C03856D740" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71325EEA-441A-4D04-85E1-B7627C15ECE8" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE098CE1-0FA0-48C0-8F9F-CC9150E96C40" } ], "operator": "OR" } ] } ]