{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2014-125031","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-01-02T07:40:24.633Z","datePublished":"2023-01-02T07:50:37.278Z","dateUpdated":"2024-08-06T14:10:56.563Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T05:54:42.380Z"},"title":"kirill2485 TekNet loggedin.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"kirill2485","product":"TekNet","versions":[{"version":"n/a","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in kirill2485 TekNet. It has been classified as problematic. Affected is an unknown function of the file pages/loggedin.php. The manipulation of the argument statusentery leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 1c575340539f983333aa43fc58ecd76eb53e1816. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217176."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in kirill2485 TekNet ausgemacht. Hiervon betroffen ist ein unbekannter Codeblock der Datei pages/loggedin.php. Durch die Manipulation des Arguments statusentery mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Patch wird als 1c575340539f983333aa43fc58ecd76eb53e1816 bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-01-02T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-01-02T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-01-02T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-01-26T19:41:44.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.217176","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.217176","tags":["signature","permissions-required"]},{"url":"https://github.com/kirill2485/TekNet/commit/1c575340539f983333aa43fc58ecd76eb53e1816","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T14:10:56.563Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.217176","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.217176","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/kirill2485/TekNet/commit/1c575340539f983333aa43fc58ecd76eb53e1816","tags":["patch","x_transferred"]}]}]}}