Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2011-0457
Deferred
More InfoOfficial Page
Source-vultures@jpcert.or.jp
View Known Exploited Vulnerability (KEV) details
Published At-15 Mar, 2011 | 17:55
Updated At-11 Apr, 2025 | 00:51

Cross-site scripting (XSS) vulnerability in e107 0.7.22 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

e107
e107
>>e107>>Versions up to 0.7.22(inclusive)
cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*
e107
e107
>>e107>>0.6_10
cpe:2.3:a:e107:e107:0.6_10:*:*:*:*:*:*:*
e107
e107
>>e107>>0.6_11
cpe:2.3:a:e107:e107:0.6_11:*:*:*:*:*:*:*
e107
e107
>>e107>>0.6_12
cpe:2.3:a:e107:e107:0.6_12:*:*:*:*:*:*:*
e107
e107
>>e107>>0.6_13
cpe:2.3:a:e107:e107:0.6_13:*:*:*:*:*:*:*
e107
e107
>>e107>>0.6_14
cpe:2.3:a:e107:e107:0.6_14:*:*:*:*:*:*:*
e107
e107
>>e107>>0.6_15
cpe:2.3:a:e107:e107:0.6_15:*:*:*:*:*:*:*
e107
e107
>>e107>>0.6_15a
cpe:2.3:a:e107:e107:0.6_15a:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7
cpe:2.3:a:e107:e107:0.7:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.0
cpe:2.3:a:e107:e107:0.7.0:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.1
cpe:2.3:a:e107:e107:0.7.1:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.2
cpe:2.3:a:e107:e107:0.7.2:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.3
cpe:2.3:a:e107:e107:0.7.3:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.4
cpe:2.3:a:e107:e107:0.7.4:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.5
cpe:2.3:a:e107:e107:0.7.5:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.6
cpe:2.3:a:e107:e107:0.7.6:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.7
cpe:2.3:a:e107:e107:0.7.7:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.8
cpe:2.3:a:e107:e107:0.7.8:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.9
cpe:2.3:a:e107:e107:0.7.9:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.10
cpe:2.3:a:e107:e107:0.7.10:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.11
cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.12
cpe:2.3:a:e107:e107:0.7.12:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.13
cpe:2.3:a:e107:e107:0.7.13:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.14
cpe:2.3:a:e107:e107:0.7.14:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.15
cpe:2.3:a:e107:e107:0.7.15:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.16
cpe:2.3:a:e107:e107:0.7.16:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.17
cpe:2.3:a:e107:e107:0.7.17:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.18
cpe:2.3:a:e107:e107:0.7.18:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.19
cpe:2.3:a:e107:e107:0.7.19:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.20
cpe:2.3:a:e107:e107:0.7.20:*:*:*:*:*:*:*
e107
e107
>>e107>>0.7.21
cpe:2.3:a:e107:e107:0.7.21:*:*:*:*:*:*:*
e107
e107
>>e107>>0.545
cpe:2.3:a:e107:e107:0.545:*:*:*:*:*:*:*
e107
e107
>>e107>>0.547
cpe:2.3:a:e107:e107:0.547:beta:*:*:*:*:*:*
e107
e107
>>e107>>0.548
cpe:2.3:a:e107:e107:0.548:beta:*:*:*:*:*:*
e107
e107
>>e107>>0.549
cpe:2.3:a:e107:e107:0.549:beta:*:*:*:*:*:*
e107
e107
>>e107>>0.551
cpe:2.3:a:e107:e107:0.551:beta:*:*:*:*:*:*
e107
e107
>>e107>>0.552
cpe:2.3:a:e107:e107:0.552:beta:*:*:*:*:*:*
e107
e107
>>e107>>0.553
cpe:2.3:a:e107:e107:0.553:beta:*:*:*:*:*:*
e107
e107
>>e107>>0.554
cpe:2.3:a:e107:e107:0.554:*:*:*:*:*:*:*
e107
e107
>>e107>>0.554
cpe:2.3:a:e107:e107:0.554:beta:*:*:*:*:*:*
e107
e107
>>e107>>0.555
cpe:2.3:a:e107:e107:0.555:beta:*:*:*:*:*:*
e107
e107
>>e107>>0.600
cpe:2.3:a:e107:e107:0.600:*:*:*:*:*:*:*
e107
e107
>>e107>>0.601
cpe:2.3:a:e107:e107:0.601:*:*:*:*:*:*:*
e107
e107
>>e107>>0.602
cpe:2.3:a:e107:e107:0.602:*:*:*:*:*:*:*
e107
e107
>>e107>>0.603
cpe:2.3:a:e107:e107:0.603:*:*:*:*:*:*:*
e107
e107
>>e107>>0.604
cpe:2.3:a:e107:e107:0.604:*:*:*:*:*:*:*
e107
e107
>>e107>>0.605
cpe:2.3:a:e107:e107:0.605:*:*:*:*:*:*:*
e107
e107
>>e107>>0.606
cpe:2.3:a:e107:e107:0.606:*:*:*:*:*:*:*
e107
e107
>>e107>>0.607
cpe:2.3:a:e107:e107:0.607:*:*:*:*:*:*:*
e107
e107
>>e107>>0.608
cpe:2.3:a:e107:e107:0.608:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://e107.org/comment.php?comment.news.872vultures@jpcert.or.jp
Patch
http://e107.org/svn_changelog.php?version=0.7.23vultures@jpcert.or.jp
N/A
http://jvn.jp/en/jp/JVN01635457/index.htmlvultures@jpcert.or.jp
N/A
http://e107.org/comment.php?comment.news.872af854a3a-2127-422b-91ae-364da2661108
Patch
http://e107.org/svn_changelog.php?version=0.7.23af854a3a-2127-422b-91ae-364da2661108
N/A
http://jvn.jp/en/jp/JVN01635457/index.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found