CVE-2013-2036
Published Jun 24, 2013
Last updated 7 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in the Filebrowser module 6.x-2.x before 6.x-2.2 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to "lists of files."
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:yoran_brault:filebrowser:6.x-2.0-rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFE49C94-BC2D-480E-8839-A0973F7FF6C0" }, { "criteria": "cpe:2.3:a:yoran_brault:filebrowser:6.x-2.0-rc2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6D8E1D7-6FF9-4A0E-9853-DAEA278099CF" }, { "criteria": "cpe:2.3:a:yoran_brault:filebrowser:6.x-2.0-rc3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9970FD49-3225-4275-9D56-48FD3DE0D886" }, { "criteria": "cpe:2.3:a:yoran_brault:filebrowser:6.x-2.0-rc4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACCE1C8E-D4BB-489B-B1DD-83226264FCD4" }, { "criteria": "cpe:2.3:a:yoran_brault:filebrowser:6.x-2.0-rc5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B6A9FCD-59C6-4BF5-A3DE-34A08A737618" }, { "criteria": "cpe:2.3:a:yoran_brault:filebrowser:6.x-2.0-rc6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FBA3583-48F2-4113-8E8B-60B50393C551" }, { "criteria": "cpe:2.3:a:yoran_brault:filebrowser:6.x-2.0-rc7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63CC16F2-81E9-48AA-A1C8-73CBF2D99670" }, { "criteria": "cpe:2.3:a:yoran_brault:filebrowser:6.x-2.0-rc8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "748F66B0-27AC-43F9-AE24-26B62BA9E634" }, { "criteria": "cpe:2.3:a:yoran_brault:filebrowser:6.x-2.0-rc9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FB22E6A-7FAF-4658-B997-5A42C3368514" }, { "criteria": "cpe:2.3:a:yoran_brault:filebrowser:6.x-2.0-rc10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B2A5C6F-1490-4090-87D5-282424D987F4" }, { "criteria": "cpe:2.3:a:yoran_brault:filebrowser:6.x-2.0-rc11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7693DA06-7CA5-4946-AA35-B71A4A6BB78E" }, { "criteria": "cpe:2.3:a:yoran_brault:filebrowser:6.x-2.0-rc12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E70F22B3-5ED4-4F46-88E4-9292EDD13D29" }, { "criteria": "cpe:2.3:a:yoran_brault:filebrowser:6.x-2.0-rc13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C64FA3FA-55F4-4C2C-A71D-73CA70D98EB2" }, { "criteria": "cpe:2.3:a:yoran_brault:filebrowser:6.x-2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A2A57F3-F359-4F0D-9AA8-6FD3C2219B60" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF" } ], "operator": "OR" } ], "operator": "AND" } ]