Executive Summary
| Informations | |||
|---|---|---|---|
| Name | CVE-2007-5727 | First vendor Publication | 2007-10-30 |
| Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
| Cvss vector : N/A | |||
|---|---|---|---|
| Overall CVSS Score | NA | ||
| Base Score | NA | Environmental Score | NA |
| impact SubScore | NA | Temporal Score | NA |
| Exploitabality Sub Score | NA | ||
| Calculate full CVSS 3.0 Vectors scores | |||
Security-Database Scoring CVSS v2
| Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
|---|---|---|---|
| Cvss Base Score | 4.3 | Attack Range | Network |
| Cvss Impact Score | 2.9 | Attack Complexity | Medium |
| Cvss Expoit Score | 8.6 | Authentication | None Required |
| Calculate full CVSS 2.0 Vectors scores | |||
Detail
| Incomplete blacklist vulnerability in the stripScripts function in common.php in OneOrZero Helpdesk 1.6.5.4, 1.6.4.2, and possibly other versions, allows remote attackers to conduct cross-site scripting (XSS) attacks and inject arbitrary web script or HTML via XSS sequences without SCRIPT tags in the description parameter to (1) tcreate.php or (2) tupdate.php, as demonstrated using an onmouseover event in a b tag. |
Original Source
| Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5727 |
CAPEC : Common Attack Pattern Enumeration & Classification
| Id | Name |
|---|---|
| CAPEC-3 | Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
| CAPEC-6 | Argument Injection |
| CAPEC-15 | Command Delimiters |
| CAPEC-18 | Embedding Scripts in Nonscript Elements |
| CAPEC-19 | Embedding Scripts within Scripts |
| CAPEC-32 | Embedding Scripts in HTTP Query Strings |
| CAPEC-43 | Exploiting Multiple Input Interpretation Layers |
| CAPEC-63 | Simple Script Injection |
| CAPEC-71 | Using Unicode Encoding to Bypass Validation Logic |
| CAPEC-73 | User-Controlled Filename |
| CAPEC-80 | Using UTF-8 Encoding to Bypass Validation Logic |
| CAPEC-85 | Client Network Footprinting (using AJAX/XSS) |
| CAPEC-86 | Embedding Script (XSS ) in HTTP Headers |
| CAPEC-91 | XSS in IMG Tags |
| CAPEC-106 | Cross Site Scripting through Log Files |
| CAPEC-163 | Spear Phishing |
| CAPEC-198 | Cross-Site Scripting in Error Pages |
| CAPEC-199 | Cross-Site Scripting Using Alternate Syntax |
| CAPEC-209 | Cross-Site Scripting Using MIME Type Mismatch |
| CAPEC-232 | Exploitation of Privilege/Trust |
| CAPEC-243 | Cross-Site Scripting in Attributes |
| CAPEC-244 | Cross-Site Scripting via Encoded URI Schemes |
| CAPEC-245 | Cross-Site Scripting Using Doubled Characters, e.g. %3C%3Cscript |
| CAPEC-246 | Cross-Site Scripting Using Flash |
| CAPEC-247 | Cross-Site Scripting with Masking through Invalid Characters in Identifiers |
CWE : Common Weakness Enumeration
| % | Id | Name |
|---|---|---|
| 100 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
| Type | Description | Count |
|---|---|---|
| Application | 2 |
Open Source Vulnerability Database (OSVDB)
| Id | Description |
|---|---|
| 38836 | OneOrZero Helpdesk tupdate.php description Parameter XSS |
| 38215 | OneOrZero Helpdesk tcreate.php description Parameter XSS |
Sources (Detail)
Alert History
| Date | Informations |
|---|---|
| 2024-11-28 23:15:57 |
|
| 2024-11-28 12:13:53 |
|
| 2021-05-04 12:06:36 |
|
| 2021-04-22 01:07:07 |
|
| 2020-05-23 00:20:42 |
|
| 2018-10-16 00:19:19 |
|
| 2016-06-28 17:01:43 |
|
| 2016-04-26 16:45:47 |
|
| 2013-05-11 10:40:45 |
|








