Unknown
CVE-2011-5214
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Multiple cross-site scripting (XSS) vulnerabilities in BrowserCRM 5.100.01 and earlier allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) index.php, (2) modules/admin/admin_module_index.php, or (3) modules/calendar/customise_calendar_times.php; login[] parameter to (4) index.php or (5) pub/clients.php; or framed parameter to (6) licence/index.php or (7) licence/view.php.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- browsercrm,
- browsercrm 4.604.01,
- browsercrm 4.605.00,
- browsercrm 4.607.00,
- browsercrm 4.610.00,
- browsercrm 4.611.01,
- browsercrm 4.612.00,
- browsercrm 4.614.00,
- browsercrm 4.615.10,
- browsercrm 4.615.11,
- browsercrm 4.616.00,
- browsercrm 4.617.00,
- browsercrm 4.619.00,
- browsercrm 4.620.01,
- browsercrm 4.622.00,
- browsercrm 4.624.00,
- browsercrm 4.624.01,
- browsercrm 4.624.50,
- browsercrm 4.624.60,
- browsercrm 4.624.70,
- browsercrm 4.624.80,
- browsercrm 4.624.90,
- browsercrm 4.691.01,
- browsercrm 4.999.20,
- browsercrm 5.000.00,
- browsercrm 5.000.01,
- browsercrm 5.001.00,
- browsercrm 5.002.00,
- browsercrm 5.100.00
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: