var-201112-0325
Vulnerability from variot
Multiple cross-site scripting (XSS) vulnerabilities in vTiger CRM 5.2.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) viewname parameter in a CalendarAjax action, (2) activity_mode parameter in a DetailView action, (3) contact_id and (4) parent_id parameters in an EditView action, (5) day, (6) month, (7) subtab, (8) view, and (9) viewOption parameters in the index action, and (10) start parameter in the ListView action to the Calendar module; (11) return_action and (12) return_module parameters in the EditView action, and (13) query parameter in an index action to the Campaigns module; (14) return_url and (15) workflow_id parameters in an editworkflow action to the com_vtiger_workflow module; (16) display_view parameter in an index action to the Dashboard module; (17) closingdate_end, (18) closingdate_start, (19) date_closed, (20) owner, (21) leadsource, (22) sales_stage, and (23) type parameters in a ListView action to the Potentials module; (24) folderid parameter in a SaveandRun action to the Reports module; (25) returnaction and (26) groupId parameters in a createnewgroup action, (27) mode and (28) parent parameters in a createrole action, (29) src_module in a ModuleManager action, (30) mode and (31) profile_id parameters in a profilePrivileges action, and (32) roleid parameter in a RoleDetailView to the Settings module; and (33) action parameter to the Home module and (34) module parameter to phprint.php. vTiger CRM Contains a cross-site scripting vulnerability.By a third party, through the following parameters, Web Script or HTML May be inserted. Vtiger CRM is a Web-based Sales Capability Automation (SFA)-based Customer Relationship Management System (CRM). Multiple cross-site scripting vulnerabilities existed in vTiger CRM 5.2.1 and earlier. The vulnerability stems from the fact that the data provided to the user has not been properly checked. A remote attacker could exploit the vulnerability to execute arbitrary script code in an unknown user's browser in the context of the affected site, stealing a cookie-based authentication certificate and initiating other attacks, or injecting arbitrary web scripts or HTML through multiple parameters, such as: viewname And the activity_mode parameter. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. vtiger CRM 5.2.1 is vulnerable; other versions may also be affected. The management system provides functions such as management, collection, and analysis of customer information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201112-0325", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "crm", "scope": "lte", "trust": 1.8, "vendor": "vtiger", "version": "5.2.1" }, { "model": "crm", "scope": "eq", "trust": 1.5, "vendor": "vtiger", "version": "5.2.1" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "vtiger crm", "version": "*" } ], "sources": [ { "db": "IVD", "id": "5a5bacb6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7e8b80-463f-11e9-be72-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2011-5742" }, { "db": "BID", "id": "49927" }, { "db": "JVNDB", "id": "JVNDB-2011-003188" }, { "db": "CNNVD", "id": "CNNVD-201112-013" }, { "db": "NVD", "id": "CVE-2011-4670" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:vtiger:vtiger_crm", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003188" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Aung Khant", "sources": [ { "db": "BID", "id": "49927" }, { "db": "CNNVD", "id": "CNNVD-201110-359" } ], "trust": 0.9 }, "cve": "CVE-2011-4670", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2011-4670", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2011-5742", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "5a5bacb6-2354-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "7d7e8b80-463f-11e9-be72-000c29342cb1", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-52615", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-4670", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-4670", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2011-5742", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201112-013", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "5a5bacb6-2354-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "7d7e8b80-463f-11e9-be72-000c29342cb1", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-52615", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "5a5bacb6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7e8b80-463f-11e9-be72-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2011-5742" }, { "db": "VULHUB", "id": "VHN-52615" }, { "db": "JVNDB", "id": "JVNDB-2011-003188" }, { "db": "CNNVD", "id": "CNNVD-201112-013" }, { "db": "NVD", "id": "CVE-2011-4670" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple cross-site scripting (XSS) vulnerabilities in vTiger CRM 5.2.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) viewname parameter in a CalendarAjax action, (2) activity_mode parameter in a DetailView action, (3) contact_id and (4) parent_id parameters in an EditView action, (5) day, (6) month, (7) subtab, (8) view, and (9) viewOption parameters in the index action, and (10) start parameter in the ListView action to the Calendar module; (11) return_action and (12) return_module parameters in the EditView action, and (13) query parameter in an index action to the Campaigns module; (14) return_url and (15) workflow_id parameters in an editworkflow action to the com_vtiger_workflow module; (16) display_view parameter in an index action to the Dashboard module; (17) closingdate_end, (18) closingdate_start, (19) date_closed, (20) owner, (21) leadsource, (22) sales_stage, and (23) type parameters in a ListView action to the Potentials module; (24) folderid parameter in a SaveandRun action to the Reports module; (25) returnaction and (26) groupId parameters in a createnewgroup action, (27) mode and (28) parent parameters in a createrole action, (29) src_module in a ModuleManager action, (30) mode and (31) profile_id parameters in a profilePrivileges action, and (32) roleid parameter in a RoleDetailView to the Settings module; and (33) action parameter to the Home module and (34) module parameter to phprint.php. vTiger CRM Contains a cross-site scripting vulnerability.By a third party, through the following parameters, Web Script or HTML May be inserted. Vtiger CRM is a Web-based Sales Capability Automation (SFA)-based Customer Relationship Management System (CRM). Multiple cross-site scripting vulnerabilities existed in vTiger CRM 5.2.1 and earlier. The vulnerability stems from the fact that the data provided to the user has not been properly checked. A remote attacker could exploit the vulnerability to execute arbitrary script code in an unknown user\u0027s browser in the context of the affected site, stealing a cookie-based authentication certificate and initiating other attacks, or injecting arbitrary web scripts or HTML through multiple parameters, such as: viewname And the activity_mode parameter. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. \nvtiger CRM 5.2.1 is vulnerable; other versions may also be affected. The management system provides functions such as management, collection, and analysis of customer information", "sources": [ { "db": "NVD", "id": "CVE-2011-4670" }, { "db": "JVNDB", "id": "JVNDB-2011-003188" }, { "db": "CNVD", "id": "CNVD-2011-5742" }, { "db": "BID", "id": "49927" }, { "db": "IVD", "id": "5a5bacb6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7e8b80-463f-11e9-be72-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-52615" } ], "trust": 2.88 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-52615", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-52615" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-4670", "trust": 3.8 }, { "db": "BID", "id": "49927", "trust": 3.2 }, { "db": "OSVDB", "id": "76006", "trust": 1.7 }, { "db": "OSVDB", "id": "76005", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-201112-013", "trust": 1.1 }, { "db": "EXPLOIT-DB", "id": "36203", "trust": 1.1 }, { "db": "EXPLOIT-DB", "id": "36204", "trust": 1.1 }, { "db": "CNVD", "id": "CNVD-2011-5742", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2011-003188", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201110-359", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20111004 VTIGER CRM 5.2.X \u003c= MULTIPLE CROSS SITE SCRIPTING VULNERABILITIES", "trust": 0.6 }, { "db": "XF", "id": "70306", "trust": 0.6 }, { "db": "FULLDISC", "id": "20111004 VTIGER CRM 5.2.X \u003c= MULTIPLE CROSS SITE SCRIPTING VULNERABILITIES", "trust": 0.6 }, { "db": "IVD", "id": "5A5BACB6-2354-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "7D7E8B80-463F-11E9-BE72-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-52615", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "5a5bacb6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7e8b80-463f-11e9-be72-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2011-5742" }, { "db": "VULHUB", "id": "VHN-52615" }, { "db": "BID", "id": "49927" }, { "db": "JVNDB", "id": "JVNDB-2011-003188" }, { "db": "CNNVD", "id": "CNNVD-201110-359" }, { "db": "CNNVD", "id": "CNNVD-201112-013" }, { "db": "NVD", "id": "CVE-2011-4670" } ] }, "id": "VAR-201112-0325", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "5a5bacb6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7e8b80-463f-11e9-be72-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2011-5742" }, { "db": "VULHUB", "id": "VHN-52615" } ], "trust": 1.6291666400000002 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "5a5bacb6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7e8b80-463f-11e9-be72-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2011-5742" } ] }, "last_update_date": "2024-11-23T22:14:09.440000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "vtigerCRM.jp", "trust": 0.8, "url": "http://www.vtigercrm.jp/home" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.vtiger.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003188" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-52615" }, { "db": "JVNDB", "id": "JVNDB-2011-003188" }, { "db": "NVD", "id": "CVE-2011-4670" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.securityfocus.com/bid/49927" }, { "trust": 2.0, "url": "http://seclists.org/fulldisclosure/2011/oct/154" }, { "trust": 1.7, "url": "http://yehg.net/lab/pr0js/advisories/%5bvtiger_5.2.1%5d_xss" }, { "trust": 1.7, "url": "http://osvdb.org/76005" }, { "trust": 1.7, "url": "http://osvdb.org/76006" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/519993/100/0/threaded" }, { "trust": 1.1, "url": "https://www.exploit-db.com/exploits/36203/" }, { "trust": 1.1, "url": "https://www.exploit-db.com/exploits/36204/" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70306" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4670" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4670" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/70306" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/519993/100/0/threaded" }, { "trust": 0.3, "url": "www.vtiger.de" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5742" }, { "db": "VULHUB", "id": "VHN-52615" }, { "db": "BID", "id": "49927" }, { "db": "JVNDB", "id": "JVNDB-2011-003188" }, { "db": "CNNVD", "id": "CNNVD-201110-359" }, { "db": "CNNVD", "id": "CNNVD-201112-013" }, { "db": "NVD", "id": "CVE-2011-4670" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "5a5bacb6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7e8b80-463f-11e9-be72-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2011-5742" }, { "db": "VULHUB", "id": "VHN-52615" }, { "db": "BID", "id": "49927" }, { "db": "JVNDB", "id": "JVNDB-2011-003188" }, { "db": "CNNVD", "id": "CNNVD-201110-359" }, { "db": "CNNVD", "id": "CNNVD-201112-013" }, { "db": "NVD", "id": "CVE-2011-4670" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-12-05T00:00:00", "db": "IVD", "id": "5a5bacb6-2354-11e6-abef-000c29c66e3d" }, { "date": "2011-12-05T00:00:00", "db": "IVD", "id": "7d7e8b80-463f-11e9-be72-000c29342cb1" }, { "date": "2011-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2011-5742" }, { "date": "2011-12-02T00:00:00", "db": "VULHUB", "id": "VHN-52615" }, { "date": "2011-10-04T00:00:00", "db": "BID", "id": "49927" }, { "date": "2011-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003188" }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201110-359" }, { "date": "2011-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-013" }, { "date": "2011-12-02T16:55:02.420000", "db": "NVD", "id": "CVE-2011-4670" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2011-5742" }, { "date": "2018-10-09T00:00:00", "db": "VULHUB", "id": "VHN-52615" }, { "date": "2011-12-06T19:37:00", "db": "BID", "id": "49927" }, { "date": "2011-12-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003188" }, { "date": "2011-10-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201110-359" }, { "date": "2011-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-013" }, { "date": "2024-11-21T01:32:44.423000", "db": "NVD", "id": "CVE-2011-4670" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201110-359" }, { "db": "CNNVD", "id": "CNNVD-201112-013" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "vTiger CRM Cross-Site Scripting Vulnerability", "sources": [ { "db": "IVD", "id": "5a5bacb6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7e8b80-463f-11e9-be72-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2011-5742" }, { "db": "CNNVD", "id": "CNNVD-201112-013" } ], "trust": 1.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201110-359" }, { "db": "CNNVD", "id": "CNNVD-201112-013" } ], "trust": 1.2 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.