CVE-2009-4168 : Detail

CVE-2009-4168

Cross-site Scripting
A03-Injection
5.2%V4
Network
2009-12-02
17h00 +00:00
2018-10-10
16h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Cross-site scripting (XSS) vulnerability in Roy Tanck tagcloud.swf, as used in the WP-Cumulus plugin before 1.23 for WordPress and the Joomulus module 2.0 and earlier for Joomla!, allows remote attackers to inject arbitrary web script or HTML via the tagcloud parameter in a tags action. Cross-site scripting (XSS) vulnerability in tagcloud.swf in the WP-Cumulus Plug-in before 1.23 for WordPress allows remote attackers to inject arbitrary web script or HTML via the tagcloud parameter.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 33371

Publication date : 2009-11-08 23h00 +00:00
Author : MustLive
EDB Verified : Yes

Products Mentioned

Configuraton 0

Roytanck>>Wp-cumulus >> Version To (including) 1.22

Roytanck>>Wp-cumulus >> Version 1.00

Roytanck>>Wp-cumulus >> Version 1.01

Roytanck>>Wp-cumulus >> Version 1.02

Roytanck>>Wp-cumulus >> Version 1.2.1

Roytanck>>Wp-cumulus >> Version 1.03

Roytanck>>Wp-cumulus >> Version 1.04

Roytanck>>Wp-cumulus >> Version 1.05

Roytanck>>Wp-cumulus >> Version 1.10

Roytanck>>Wp-cumulus >> Version 1.11

Roytanck>>Wp-cumulus >> Version 1.12

Roytanck>>Wp-cumulus >> Version 1.13

Roytanck>>Wp-cumulus >> Version 1.14

Roytanck>>Wp-cumulus >> Version 1.15

Roytanck>>Wp-cumulus >> Version 1.16

Roytanck>>Wp-cumulus >> Version 1.17

Roytanck>>Wp-cumulus >> Version 1.18

Roytanck>>Wp-cumulus >> Version 1.19

Roytanck>>Wp-cumulus >> Version 1.20

Wordpress>>Wordpress >> Version *

References

http://websecurity.com.ua/3789/
Tags : x_refsource_MISC
http://websecurity.com.ua/3665/
Tags : x_refsource_MISC
http://websecurity.com.ua/3801/
Tags : x_refsource_MISC
http://websecurity.com.ua/3839/
Tags : x_refsource_MISC
http://secunia.com/advisories/37483
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3322
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/38161
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/37100
Tags : vdb-entry, x_refsource_BID
http://www.securityfocus.com/bid/37479
Tags : vdb-entry, x_refsource_BID