Appointment Scheduler 3.0 is vulnerable to CSV Injection via a Language > Labels > Export action.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://www.phpjabbers.com/appointment-scheduler/ | product |
http://packetstormsecurity.com/files/176058 | third party advisory vdb entry exploit |