Vulnerability Description
A vulnerability has been found in stiiv contact_app and classified as problematic. Affected by this vulnerability is the function render of the file libs/View.php. The manipulation of the argument var leads to cross site scripting. The attack can be launched remotely. The patch is named 67bec33f559da9d41a1b45eb9e992bd8683a7f8c. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217183.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Contact App Project | Contact App | < 2014-12-04 |
Related Weaknesses (CWE)
References
- https://github.com/stiiv/contact_app/commit/67bec33f559da9d41a1b45eb9e992bd8683aPatchThird Party Advisory
- https://vuldb.com/?ctiid.217183Third Party Advisory
- https://vuldb.com/?id.217183Third Party Advisory
- https://github.com/stiiv/contact_app/commit/67bec33f559da9d41a1b45eb9e992bd8683aPatchThird Party Advisory
- https://vuldb.com/?ctiid.217183Third Party Advisory
- https://vuldb.com/?id.217183Third Party Advisory
FAQ
What is CVE-2014-125034?
CVE-2014-125034 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability has been found in stiiv contact_app and classified as problematic. Affected by this vulnerability is the function render of the file libs/View.php. The manipulation of the argument var...
How severe is CVE-2014-125034?
CVE-2014-125034 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-125034?
Check the references section above for vendor advisories and patch information. Affected products include: Contact App Project Contact App.