Lucene search

K
cve[email protected]CVE-2022-4591
HistoryDec 17, 2022 - 7:15 p.m.

CVE-2022-4591

2022-12-1719:15:09
CWE-707
CWE-79
web.nvd.nist.gov
23
cve-2022-4591
vulnerability
remote code execution
mschaef toto
email parameter handler
cross site scripting

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

30.5%

A vulnerability was found in mschaef toto up to 1.4.20. It has been declared as problematic. This vulnerability affects unknown code of the component Email Parameter Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.4.21 is able to address this issue. The name of the patch is 1f27f37c1a06f54a76971f70eaa6139dc139bdf9. It is recommended to upgrade the affected component. VDB-216178 is the identifier assigned to this vulnerability.

Affected configurations

Vulners
NVD
Node
toto_projecttotoMatch1.4.0
OR
toto_projecttotoMatch1.4.1
OR
toto_projecttotoMatch1.4.2
OR
toto_projecttotoMatch1.4.3
OR
toto_projecttotoMatch1.4.4
OR
toto_projecttotoMatch1.4.5
OR
toto_projecttotoMatch1.4.6
OR
toto_projecttotoMatch1.4.7
OR
toto_projecttotoMatch1.4.8
OR
toto_projecttotoMatch1.4.9
OR
toto_projecttotoMatch1.4.10
OR
toto_projecttotoMatch1.4.11
OR
toto_projecttotoMatch1.4.12
OR
toto_projecttotoMatch1.4.13
OR
toto_projecttotoMatch1.4.14
OR
toto_projecttotoMatch1.4.15
OR
toto_projecttotoMatch1.4.16
OR
toto_projecttotoMatch1.4.17
OR
toto_projecttotoMatch1.4.18
OR
toto_projecttotoMatch1.4.19
OR
toto_projecttotoMatch1.4.20
VendorProductVersionCPE
toto_projecttoto1.4.0cpe:2.3:a:toto_project:toto:1.4.0:*:*:*:*:*:*:*
toto_projecttoto1.4.1cpe:2.3:a:toto_project:toto:1.4.1:*:*:*:*:*:*:*
toto_projecttoto1.4.2cpe:2.3:a:toto_project:toto:1.4.2:*:*:*:*:*:*:*
toto_projecttoto1.4.3cpe:2.3:a:toto_project:toto:1.4.3:*:*:*:*:*:*:*
toto_projecttoto1.4.4cpe:2.3:a:toto_project:toto:1.4.4:*:*:*:*:*:*:*
toto_projecttoto1.4.5cpe:2.3:a:toto_project:toto:1.4.5:*:*:*:*:*:*:*
toto_projecttoto1.4.6cpe:2.3:a:toto_project:toto:1.4.6:*:*:*:*:*:*:*
toto_projecttoto1.4.7cpe:2.3:a:toto_project:toto:1.4.7:*:*:*:*:*:*:*
toto_projecttoto1.4.8cpe:2.3:a:toto_project:toto:1.4.8:*:*:*:*:*:*:*
toto_projecttoto1.4.9cpe:2.3:a:toto_project:toto:1.4.9:*:*:*:*:*:*:*
Rows per page:
1-10 of 211

CNA Affected

[
  {
    "vendor": "mschaef",
    "product": "toto",
    "versions": [
      {
        "version": "1.4.0",
        "status": "affected"
      },
      {
        "version": "1.4.1",
        "status": "affected"
      },
      {
        "version": "1.4.2",
        "status": "affected"
      },
      {
        "version": "1.4.3",
        "status": "affected"
      },
      {
        "version": "1.4.4",
        "status": "affected"
      },
      {
        "version": "1.4.5",
        "status": "affected"
      },
      {
        "version": "1.4.6",
        "status": "affected"
      },
      {
        "version": "1.4.7",
        "status": "affected"
      },
      {
        "version": "1.4.8",
        "status": "affected"
      },
      {
        "version": "1.4.9",
        "status": "affected"
      },
      {
        "version": "1.4.10",
        "status": "affected"
      },
      {
        "version": "1.4.11",
        "status": "affected"
      },
      {
        "version": "1.4.12",
        "status": "affected"
      },
      {
        "version": "1.4.13",
        "status": "affected"
      },
      {
        "version": "1.4.14",
        "status": "affected"
      },
      {
        "version": "1.4.15",
        "status": "affected"
      },
      {
        "version": "1.4.16",
        "status": "affected"
      },
      {
        "version": "1.4.17",
        "status": "affected"
      },
      {
        "version": "1.4.18",
        "status": "affected"
      },
      {
        "version": "1.4.19",
        "status": "affected"
      },
      {
        "version": "1.4.20",
        "status": "affected"
      }
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

30.5%

Related for CVE-2022-4591