Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2003-1285

Опубликовано: 31 дек. 2003
Источник: nvd
CVSS2: 4.3
EPSS Низкий

Описание

Multiple cross-site scripting (XSS) vulnerabilities in Sambar Server before 6.0 beta 6 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) isapi/testisa.dll, (2) testcgi.exe, (3) environ.pl, (4) the query parameter to samples/search.dll, (5) the price parameter to mortgage.pl, (6) the query string in dumpenv.pl, (7) the query string to dumpenv.pl, and (8) the E-Mail field of the guestbook script (book.pl).

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:sambar:sambar_server:5.0:*:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:5.0:beta1:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:5.0:beta2:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:5.0:beta3:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:5.0:beta4:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:5.0:beta5:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:5.0:beta6:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:5.1:*:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:5.1:beta1:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:5.1:beta2:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:5.1:beta3:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:5.1:beta4:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:5.1:beta5:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:5.2:*:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:5.3:*:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:6.0:beta3:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:6.0:beta4:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:6.0:beta5:*:*:*:*:*:*

EPSS

Процентиль: 80%
0.01386
Низкий

4.3 Medium

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

github
почти 4 года назад

Multiple cross-site scripting (XSS) vulnerabilities in Sambar Server before 6.0 beta 6 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) isapi/testisa.dll, (2) testcgi.exe, (3) environ.pl, (4) the query parameter to samples/search.dll, (5) the price parameter to mortgage.pl, (6) the query string in dumpenv.pl, (7) the query string to dumpenv.pl, and (8) the E-Mail field of the guestbook script (book.pl).

EPSS

Процентиль: 80%
0.01386
Низкий

4.3 Medium

CVSS2

Дефекты

NVD-CWE-Other