CVE-2001-1524
Published Dec 31, 2001
Last updated 16 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in PHP-Nuke 5.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) uname parameter in user.php, (2) ttitle, letter and file parameters in modules.php, (3) subject, story and storyext parameters in submit.php, (4) upload parameter in admin.php and (5) fname parameter in friend.php.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CB52E20-9A87-4CE4-9E75-B0833F083845" }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E87A3E6-935F-4569-8B5F-70A88442FD4C" }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7E4C570-648F-48EF-B965-16C5878A0CBA" }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC3CBB92-6A11-4B5B-A910-B0287AB12846" }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:4.4.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C17255B-64E1-4DFF-8C21-8BB1D78A5256" }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93B755A9-694E-49FA-9068-353203AF9965" }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA0B88AD-CACF-4E48-A4B1-313FFE32D058" }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF4C3F85-A23C-40B9-9B0F-564E7C254AA5" }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EAF55C4-F0A7-4A36-B203-83670D58483F" }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3ED3BFC-C8CF-4537-832C-0D00400AC064" }, { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:5.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C94B62CA-8D34-4B37-8748-1FE64F0299DF" } ], "operator": "OR" } ] } ]