CVE-2013-1466 : Detail

CVE-2013-1466

Cross-site Scripting
A03-Injection
8.71%V4
Network
2014-02-05
14h00 +00:00
2017-08-28
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple cross-site scripting (XSS) vulnerabilities in glFusion before 1.2.2.pl4 allow remote attackers to inject arbitrary web script or HTML via the (1) subject parameter to profiles.php; (2) address1, (3) address2, (4) calendar_type, (5) city, (6) state, (7) title, (8) url, or (9) zipcode parameter to calendar/index.php; (10) title or (11) url parameter to links/index.php; or (12) PATH_INFO to admin/plugins/mediagallery/xppubwiz.php/.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 24536

Publication date : 2013-02-20 23h00 +00:00
Author : High-Tech Bridge SA
EDB Verified : No

Products Mentioned

Configuraton 0

Glfusion>>Glfusion >> Version To (including) 1.2.2.pl3

Glfusion>>Glfusion >> Version 1.0.0

Glfusion>>Glfusion >> Version 1.0.0

Glfusion>>Glfusion >> Version 1.0.0

Glfusion>>Glfusion >> Version 1.0.1

Glfusion>>Glfusion >> Version 1.0.2

Glfusion>>Glfusion >> Version 1.1.0

Glfusion>>Glfusion >> Version 1.1.0

Glfusion>>Glfusion >> Version 1.1.1

Glfusion>>Glfusion >> Version 1.1.2

Glfusion>>Glfusion >> Version 1.1.3

Glfusion>>Glfusion >> Version 1.1.4

Glfusion>>Glfusion >> Version 1.1.4.pl1

Glfusion>>Glfusion >> Version 1.1.4.pl2

Glfusion>>Glfusion >> Version 1.1.4.pl3

Glfusion>>Glfusion >> Version 1.1.4.pl4

Glfusion>>Glfusion >> Version 1.1.5

Glfusion>>Glfusion >> Version 1.1.5.pl1

Glfusion>>Glfusion >> Version 1.1.5.pl2

Glfusion>>Glfusion >> Version 1.1.5.pl3

Glfusion>>Glfusion >> Version 1.1.6

Glfusion>>Glfusion >> Version 1.1.6.pl1

Glfusion>>Glfusion >> Version 1.1.6.pl2

Glfusion>>Glfusion >> Version 1.1.6.pl3

Glfusion>>Glfusion >> Version 1.1.6.pl4

Glfusion>>Glfusion >> Version 1.1.7

Glfusion>>Glfusion >> Version 1.1.8

Glfusion>>Glfusion >> Version 1.1.8.pl1

Glfusion>>Glfusion >> Version 1.1.8.pl2

Glfusion>>Glfusion >> Version 1.1.8.pl3

Glfusion>>Glfusion >> Version 1.1.8.pl4

Glfusion>>Glfusion >> Version 1.1.8.pl5

Glfusion>>Glfusion >> Version 1.1.8.pl6

Glfusion>>Glfusion >> Version 1.2.0

Glfusion>>Glfusion >> Version 1.2.0.pl1

Glfusion>>Glfusion >> Version 1.2.0.pl2

Glfusion>>Glfusion >> Version 1.2.0.pl3

Glfusion>>Glfusion >> Version 1.2.0.pl4

Glfusion>>Glfusion >> Version 1.2.0.pl5

Glfusion>>Glfusion >> Version 1.2.0.pl6

Glfusion>>Glfusion >> Version 1.2.0.pl7

Glfusion>>Glfusion >> Version 1.2.2

Glfusion>>Glfusion >> Version 1.2.2.pl1

Glfusion>>Glfusion >> Version 1.2.2.pl2

References

http://www.exploit-db.com/exploits/24536
Tags : exploit, x_refsource_EXPLOIT-DB
http://secunia.com/advisories/52255
Tags : third-party-advisory, x_refsource_SECUNIA