Логотип exploitDog
bind:CVE-2011-4958
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2011-4958

Количество 3

Количество 3

nvd логотип

CVE-2011-4958

почти 12 лет назад

Cross-site scripting (XSS) vulnerability in the process function in SSViewer.php in SilverStripe before 2.3.13 and 2.4.x before 2.4.6 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING to template placeholders, as demonstrated by a request to (1) admin/reports/, (2) admin/comments/, (3) admin/, (4) admin/show/, (5) admin/assets/, and (6) admin/security/.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2011-4958

почти 12 лет назад

Cross-site scripting (XSS) vulnerability in the process function in SS ...

CVSS2: 4.3
EPSS: Низкий
github логотип

GHSA-hvm5-xrxv-6g4q

больше 3 лет назад

Cross-site scripting (XSS) vulnerability in the process function in SSViewer.php in SilverStripe before 2.3.13 and 2.4.x before 2.4.6 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING to template placeholders, as demonstrated by a request to (1) admin/reports/, (2) admin/comments/, (3) admin/, (4) admin/show/, (5) admin/assets/, and (6) admin/security/.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2011-4958

Cross-site scripting (XSS) vulnerability in the process function in SSViewer.php in SilverStripe before 2.3.13 and 2.4.x before 2.4.6 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING to template placeholders, as demonstrated by a request to (1) admin/reports/, (2) admin/comments/, (3) admin/, (4) admin/show/, (5) admin/assets/, and (6) admin/security/.

CVSS2: 4.3
9%
Низкий
почти 12 лет назад
debian логотип
CVE-2011-4958

Cross-site scripting (XSS) vulnerability in the process function in SS ...

CVSS2: 4.3
9%
Низкий
почти 12 лет назад
github логотип
GHSA-hvm5-xrxv-6g4q

Cross-site scripting (XSS) vulnerability in the process function in SSViewer.php in SilverStripe before 2.3.13 and 2.4.x before 2.4.6 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING to template placeholders, as demonstrated by a request to (1) admin/reports/, (2) admin/comments/, (3) admin/, (4) admin/show/, (5) admin/assets/, and (6) admin/security/.

9%
Низкий
больше 3 лет назад

Уязвимостей на страницу