CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
87.0%
Multiple cross-site scripting (XSS) vulnerabilities in Scout Portal Toolkit (SPT) 1.3.1 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the ss parameter in SPT–QuickSearch.php; (2) ParentId parameter in SPT–BrowseResources.php; (3) the ResourceId parameter in SPT–FullRecord.php; (4) ResourceOffset parameter in SPT–Home.php, (5) F_SearchString parameter in SPT–QuickSearch.php; (6) F_UserName and (7) F_Password parameters in SPT–UserLogin.php; (8) F_SearchCat1, (9) F_TextField1, (10) F_SearchCat2, (11) F_TextField2, (12) F_SearchCat3, (13) F_TextField3, (14) F_SearchCat4, (15) F_TextField4, (16) ResourceType, (17) Language, (18) Audience, (19) Format parameters in SPT–AdvancedSearch.php.
Vendor | Product | Version | CPE |
---|---|---|---|
internet_scout | scout_portal_toolkit | * | cpe:2.3:a:internet_scout:scout_portal_toolkit:*:*:*:*:*:*:*:* |
internet_scout | scout_portal_toolkit | 1.3.0_beta | cpe:2.3:a:internet_scout:scout_portal_toolkit:1.3.0_beta:*:*:*:*:*:*:* |
secunia.com/advisories/17979
www.osvdb.org/21630
www.osvdb.org/21631
www.osvdb.org/21632
www.osvdb.org/21633
www.osvdb.org/21634
www.osvdb.org/21635
www.osvdb.org/21636
www.securityfocus.com/bid/15818
www.vupen.com/english/advisories/2005/2844
www.x-illusion.com/rs/Scout%20Portal%20Toolkit.txt
exchange.xforce.ibmcloud.com/vulnerabilities/23545