Lucene search

K
cvelistVulDBCVELIST:CVE-2022-4591
HistoryDec 17, 2022 - 12:00 a.m.

CVE-2022-4591 mschaef toto Email Parameter cross site scripting

2022-12-1700:00:00
CWE-707
VulDB
www.cve.org
vulnerability
mschaef toto
email parameter handler
remote
cross site scripting
upgrade
patch
vdb-216178

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

30.6%

A vulnerability was found in mschaef toto up to 1.4.20. It has been declared as problematic. This vulnerability affects unknown code of the component Email Parameter Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.4.21 is able to address this issue. The name of the patch is 1f27f37c1a06f54a76971f70eaa6139dc139bdf9. It is recommended to upgrade the affected component. VDB-216178 is the identifier assigned to this vulnerability.

CNA Affected

[
  {
    "vendor": "mschaef",
    "product": "toto",
    "versions": [
      {
        "version": "1.4.0",
        "status": "affected"
      },
      {
        "version": "1.4.1",
        "status": "affected"
      },
      {
        "version": "1.4.2",
        "status": "affected"
      },
      {
        "version": "1.4.3",
        "status": "affected"
      },
      {
        "version": "1.4.4",
        "status": "affected"
      },
      {
        "version": "1.4.5",
        "status": "affected"
      },
      {
        "version": "1.4.6",
        "status": "affected"
      },
      {
        "version": "1.4.7",
        "status": "affected"
      },
      {
        "version": "1.4.8",
        "status": "affected"
      },
      {
        "version": "1.4.9",
        "status": "affected"
      },
      {
        "version": "1.4.10",
        "status": "affected"
      },
      {
        "version": "1.4.11",
        "status": "affected"
      },
      {
        "version": "1.4.12",
        "status": "affected"
      },
      {
        "version": "1.4.13",
        "status": "affected"
      },
      {
        "version": "1.4.14",
        "status": "affected"
      },
      {
        "version": "1.4.15",
        "status": "affected"
      },
      {
        "version": "1.4.16",
        "status": "affected"
      },
      {
        "version": "1.4.17",
        "status": "affected"
      },
      {
        "version": "1.4.18",
        "status": "affected"
      },
      {
        "version": "1.4.19",
        "status": "affected"
      },
      {
        "version": "1.4.20",
        "status": "affected"
      }
    ]
  }
]

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

30.6%

Related for CVELIST:CVE-2022-4591