4.3
CVSSv2

CVE-2005-4196

Published: 13/12/2005 Updated: 20/07/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 445
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in Scout Portal Toolkit (SPT) 1.3.1 and previous versions allow remote malicious users to inject arbitrary web script or HTML via (1) the ss parameter in SPT--QuickSearch.php; (2) ParentId parameter in SPT--BrowseResources.php; (3) the ResourceId parameter in SPT--FullRecord.php; (4) ResourceOffset parameter in SPT--Home.php, (5) F_SearchString parameter in SPT--QuickSearch.php; (6) F_UserName and (7) F_Password parameters in SPT--UserLogin.php; (8) F_SearchCat1, (9) F_TextField1, (10) F_SearchCat2, (11) F_TextField2, (12) F_SearchCat3, (13) F_TextField3, (14) F_SearchCat4, (15) F_TextField4, (16) ResourceType, (17) Language, (18) Audience, (19) Format parameters in SPT--AdvancedSearch.php.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

internet scout scout portal toolkit 1.3.0_beta

internet scout scout portal toolkit

Exploits

source: wwwsecurityfocuscom/bid/15818/info Scout Portal Toolkit is prone to multiple input-validation vulnerabilities because the application fails to properly sanitize user-supplied input A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying d ...
source: wwwsecurityfocuscom/bid/15818/info Scout Portal Toolkit is prone to multiple input-validation vulnerabilities because the application fails to properly sanitize user-supplied input A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying datab ...
source: wwwsecurityfocuscom/bid/15818/info Scout Portal Toolkit is prone to multiple input-validation vulnerabilities because the application fails to properly sanitize user-supplied input A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying dat ...