Vulnerabilites related to unspecified - Gwolle Guestbook Plugin
cve-2017-20089
Vulnerability from cvelistv5
Published
2022-06-23 04:20
Modified
2024-08-05 21:45
Severity ?
EPSS score ?
Summary
A vulnerability was found in Gwolle Guestbook Plugin 1.7.4. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to basic cross site scripting. The attack may be initiated remotely.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/bugtraq/2017/Mar/1 | x_refsource_MISC | |
https://vuldb.com/?id.97379 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
unspecified | Gwolle Guestbook Plugin |
Version: 1.7.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:45:25.272Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://seclists.org/bugtraq/2017/Mar/1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuldb.com/?id.97379" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Gwolle Guestbook Plugin", "vendor": "unspecified", "versions": [ { "status": "affected", "version": "1.7.4" } ] } ], "credits": [ { "lang": "en", "value": "Radjnies Bhansingh" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Gwolle Guestbook Plugin 1.7.4. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to basic cross site scripting. The attack may be initiated remotely." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80 Basic Cross Site Scripting", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-23T04:20:29", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://seclists.org/bugtraq/2017/Mar/1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vuldb.com/?id.97379" } ], "title": "Gwolle Guestbook Plugin cross site scriting", "x_generator": "vuldb.com", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2017-20089", "REQUESTER": "cna@vuldb.com", "STATE": "PUBLIC", "TITLE": "Gwolle Guestbook Plugin cross site scriting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Gwolle Guestbook Plugin", "version": { "version_data": [ { "version_value": "1.7.4" } ] } } ] }, "vendor_name": "" } ] } }, "credit": "Radjnies Bhansingh", "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was found in Gwolle Guestbook Plugin 1.7.4. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to basic cross site scripting. The attack may be initiated remotely." } ] }, "generator": "vuldb.com", "impact": { "cvss": { "baseScore": "3.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-80 Basic Cross Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "http://seclists.org/bugtraq/2017/Mar/1", "refsource": "MISC", "url": "http://seclists.org/bugtraq/2017/Mar/1" }, { "name": "https://vuldb.com/?id.97379", "refsource": "MISC", "url": "https://vuldb.com/?id.97379" } ] } } } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2017-20089", "datePublished": "2022-06-23T04:20:29", "dateReserved": "2022-06-19T00:00:00", "dateUpdated": "2024-08-05T21:45:25.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }