Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2007-3060
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Multiple cross-site scripting (XSS) vulnerabilities in PHP Live! 3.2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) sid parameter to (a) chat.php, (2) LANG[DEFAULT_BRANDING] and (3) PHPLIVE_VERSION parameters to (b) help.php, the (4) admin[name] parameter to (c) admin/header.php, and the (5) BASE_URL parameter to (d) super/info.php, and in some cases, the LANG[DEFAULT_BRANDING], PHPLIVE_VERSION, and (6) nav_line parameters to setup/footer.php, different vectors than CVE-2006-6769..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- None
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:osi_codes_inc.:phplive:3.2.2:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.securityfocus.com/archive/1/470275
- http://marc.info/?l=full-disclosure&m=118072121020357&w=2
- http://www.securityfocus.com/bid/24276
- http://secunia.com/advisories/25441
- http://osvdb.org/36990
- http://osvdb.org/38383
- http://osvdb.org/38379
- http://osvdb.org/36987
- http://osvdb.org/38382
- http://osvdb.org/36989
- http://osvdb.org/38380
- http://osvdb.org/36986
- http://osvdb.org/36988
- http://osvdb.org/38381
- http://www.vupen.com/english/advisories/2007/2082
- http://www.securityfocus.com/archive/1/470508/100/0/threaded