Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
2 vulnerabilities by mschaef
CVE-2022-4590 (GCVE-0-2022-4590)
Vulnerability from cvelistv5 – Published: 2022-12-17 00:00 – Updated: 2025-04-15 13:00
VLAI?
Title
mschaef toto Todo List cross site scripting
Summary
A vulnerability was found in mschaef toto up to 1.4.20. It has been classified as problematic. This affects an unknown part of the component Todo List Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.4.21 is able to address this issue. The name of the patch is fdc825ac5249f40683377e8a526a06cdc6870125. It is recommended to upgrade the affected component. The identifier VDB-216177 was assigned to this vulnerability.
Severity ?
CWE
- CWE-707 - Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| mschaef | toto |
Affected:
1.4.0
Affected: 1.4.1 Affected: 1.4.2 Affected: 1.4.3 Affected: 1.4.4 Affected: 1.4.5 Affected: 1.4.6 Affected: 1.4.7 Affected: 1.4.8 Affected: 1.4.9 Affected: 1.4.10 Affected: 1.4.11 Affected: 1.4.12 Affected: 1.4.13 Affected: 1.4.14 Affected: 1.4.15 Affected: 1.4.16 Affected: 1.4.17 Affected: 1.4.18 Affected: 1.4.19 Affected: 1.4.20 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T01:41:45.790Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/mschaef/toto/commit/fdc825ac5249f40683377e8a526a06cdc6870125"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/mschaef/toto/releases/tag/1.4.21"
},
{
"tags": [
"x_transferred"
],
"url": "https://vuldb.com/?id.216177"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-4590",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-14T17:02:36.584121Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-15T13:00:48.398Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "toto",
"vendor": "mschaef",
"versions": [
{
"status": "affected",
"version": "1.4.0"
},
{
"status": "affected",
"version": "1.4.1"
},
{
"status": "affected",
"version": "1.4.2"
},
{
"status": "affected",
"version": "1.4.3"
},
{
"status": "affected",
"version": "1.4.4"
},
{
"status": "affected",
"version": "1.4.5"
},
{
"status": "affected",
"version": "1.4.6"
},
{
"status": "affected",
"version": "1.4.7"
},
{
"status": "affected",
"version": "1.4.8"
},
{
"status": "affected",
"version": "1.4.9"
},
{
"status": "affected",
"version": "1.4.10"
},
{
"status": "affected",
"version": "1.4.11"
},
{
"status": "affected",
"version": "1.4.12"
},
{
"status": "affected",
"version": "1.4.13"
},
{
"status": "affected",
"version": "1.4.14"
},
{
"status": "affected",
"version": "1.4.15"
},
{
"status": "affected",
"version": "1.4.16"
},
{
"status": "affected",
"version": "1.4.17"
},
{
"status": "affected",
"version": "1.4.18"
},
{
"status": "affected",
"version": "1.4.19"
},
{
"status": "affected",
"version": "1.4.20"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in mschaef toto up to 1.4.20. It has been classified as problematic. This affects an unknown part of the component Todo List Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.4.21 is able to address this issue. The name of the patch is fdc825ac5249f40683377e8a526a06cdc6870125. It is recommended to upgrade the affected component. The identifier VDB-216177 was assigned to this vulnerability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-707",
"description": "CWE-707 Improper Neutralization -\u003e CWE-74 Injection -\u003e CWE-79 Cross Site Scripting",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-17T00:00:00.000Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"url": "https://github.com/mschaef/toto/commit/fdc825ac5249f40683377e8a526a06cdc6870125"
},
{
"url": "https://github.com/mschaef/toto/releases/tag/1.4.21"
},
{
"url": "https://vuldb.com/?id.216177"
}
],
"title": "mschaef toto Todo List cross site scripting",
"x_generator": "vuldb.com"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2022-4590",
"datePublished": "2022-12-17T00:00:00.000Z",
"dateReserved": "2022-12-17T00:00:00.000Z",
"dateUpdated": "2025-04-15T13:00:48.398Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-4591 (GCVE-0-2022-4591)
Vulnerability from cvelistv5 – Published: 2022-12-17 00:00 – Updated: 2025-04-15 13:00
VLAI?
Title
mschaef toto Email Parameter cross site scripting
Summary
A vulnerability was found in mschaef toto up to 1.4.20. It has been declared as problematic. This vulnerability affects unknown code of the component Email Parameter Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.4.21 is able to address this issue. The name of the patch is 1f27f37c1a06f54a76971f70eaa6139dc139bdf9. It is recommended to upgrade the affected component. VDB-216178 is the identifier assigned to this vulnerability.
Severity ?
CWE
- CWE-707 - Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| mschaef | toto |
Affected:
1.4.0
Affected: 1.4.1 Affected: 1.4.2 Affected: 1.4.3 Affected: 1.4.4 Affected: 1.4.5 Affected: 1.4.6 Affected: 1.4.7 Affected: 1.4.8 Affected: 1.4.9 Affected: 1.4.10 Affected: 1.4.11 Affected: 1.4.12 Affected: 1.4.13 Affected: 1.4.14 Affected: 1.4.15 Affected: 1.4.16 Affected: 1.4.17 Affected: 1.4.18 Affected: 1.4.19 Affected: 1.4.20 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T01:41:45.873Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/mschaef/toto/releases/tag/1.4.21"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/mschaef/toto/commit/1f27f37c1a06f54a76971f70eaa6139dc139bdf9"
},
{
"tags": [
"x_transferred"
],
"url": "https://vuldb.com/?id.216178"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-4591",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-14T17:02:31.424135Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-15T13:00:40.801Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "toto",
"vendor": "mschaef",
"versions": [
{
"status": "affected",
"version": "1.4.0"
},
{
"status": "affected",
"version": "1.4.1"
},
{
"status": "affected",
"version": "1.4.2"
},
{
"status": "affected",
"version": "1.4.3"
},
{
"status": "affected",
"version": "1.4.4"
},
{
"status": "affected",
"version": "1.4.5"
},
{
"status": "affected",
"version": "1.4.6"
},
{
"status": "affected",
"version": "1.4.7"
},
{
"status": "affected",
"version": "1.4.8"
},
{
"status": "affected",
"version": "1.4.9"
},
{
"status": "affected",
"version": "1.4.10"
},
{
"status": "affected",
"version": "1.4.11"
},
{
"status": "affected",
"version": "1.4.12"
},
{
"status": "affected",
"version": "1.4.13"
},
{
"status": "affected",
"version": "1.4.14"
},
{
"status": "affected",
"version": "1.4.15"
},
{
"status": "affected",
"version": "1.4.16"
},
{
"status": "affected",
"version": "1.4.17"
},
{
"status": "affected",
"version": "1.4.18"
},
{
"status": "affected",
"version": "1.4.19"
},
{
"status": "affected",
"version": "1.4.20"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in mschaef toto up to 1.4.20. It has been declared as problematic. This vulnerability affects unknown code of the component Email Parameter Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.4.21 is able to address this issue. The name of the patch is 1f27f37c1a06f54a76971f70eaa6139dc139bdf9. It is recommended to upgrade the affected component. VDB-216178 is the identifier assigned to this vulnerability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-707",
"description": "CWE-707 Improper Neutralization -\u003e CWE-74 Injection -\u003e CWE-79 Cross Site Scripting",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-17T00:00:00.000Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"url": "https://github.com/mschaef/toto/releases/tag/1.4.21"
},
{
"url": "https://github.com/mschaef/toto/commit/1f27f37c1a06f54a76971f70eaa6139dc139bdf9"
},
{
"url": "https://vuldb.com/?id.216178"
}
],
"title": "mschaef toto Email Parameter cross site scripting",
"x_generator": "vuldb.com"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2022-4591",
"datePublished": "2022-12-17T00:00:00.000Z",
"dateReserved": "2022-12-17T00:00:00.000Z",
"dateUpdated": "2025-04-15T13:00:40.801Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}