CVE-2012-1293

Multiple cross-site scripting (XSS) vulnerabilities in fup in Frams' Fast File EXchange (F*EX, aka fex) before 20111129-2 allow remote attackers to inject arbitrary web script or HTML via the (1) to or (2) from parameters.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ulli_horlacher:fex:*:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110609:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110610:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110614:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110615:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110616:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110621:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110622:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110627:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110630:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110701:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110714:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110716:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110722:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110726:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110727:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110730:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110731:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110803:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110807:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110808:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110809:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110810:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110811:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110813:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110826:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110829:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110830:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110901:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110905:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110906:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110907:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110919:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110920:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110921:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20110930:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20111003:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20111005:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20111013:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20111028:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20111102:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20111108:*:*:*:*:*:*:*
cpe:2.3:a:ulli_horlacher:fex:20111115:*:*:*:*:*:*:*

History

21 Nov 2024, 01:36

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2012-02/0109.html - () http://archives.neohapsis.com/archives/bugtraq/2012-02/0109.html -
References () http://archives.neohapsis.com/archives/bugtraq/2012-02/0112.html - () http://archives.neohapsis.com/archives/bugtraq/2012-02/0112.html -
References () http://fex.rus.uni-stuttgart.de/fex.html - Patch () http://fex.rus.uni-stuttgart.de/fex.html - Patch
References () http://osvdb.org/79420 - () http://osvdb.org/79420 -
References () http://secunia.com/advisories/47971 - Vendor Advisory () http://secunia.com/advisories/47971 - Vendor Advisory
References () http://www.debian.org/security/2012/dsa-2414 - () http://www.debian.org/security/2012/dsa-2414 -
References () http://www.openwall.com/lists/oss-security/2012/02/20/1 - Exploit () http://www.openwall.com/lists/oss-security/2012/02/20/1 - Exploit
References () http://www.openwall.com/lists/oss-security/2012/02/20/8 - () http://www.openwall.com/lists/oss-security/2012/02/20/8 -
References () http://www.openwall.com/lists/oss-security/2012/02/23/2 - () http://www.openwall.com/lists/oss-security/2012/02/23/2 -
References () http://www.securityfocus.com/bid/52085 - () http://www.securityfocus.com/bid/52085 -

Information

Published : 2012-09-25 23:55

Updated : 2024-11-21 01:36


NVD link : CVE-2012-1293

Mitre link : CVE-2012-1293

CVE.ORG link : CVE-2012-1293


JSON object : View

Products Affected

ulli_horlacher

  • fex
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')