CVE-2013-6042
Published Nov 19, 2013
Last updated a year ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in filemanager/login.php in the File Manager module in Softaculous Webuzo before 2.1.4 allows remote attackers to inject arbitrary web script or HTML via the user parameter.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:softaculous:webuzo:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBAB3B87-A657-4E3B-95A8-8AB6C7C4B0E7", "versionEndIncluding": "2.1.3" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6997A98C-6619-4E12-A033-909077821DB8" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35BD6F23-C724-449A-9923-AA23C4AB59C0" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBE9AAC0-BEA4-4B07-9913-00928A081D4F" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "809F62F2-5FB4-4339-AEBF-F202DB4B2A14" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2ED8BEE-E4AE-4800-B376-CDA9EE134D10" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EBAB6E5-25AB-449B-965F-105E06F18F58" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "884853CD-EAC8-4F5F-A461-764D26C15794" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3700E8AF-BA14-4F87-A58D-945818D2B390" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD9FF810-C85B-44E0-9B05-69F412BEFB95" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5DC0C1FE-1EC0-4B98-AD7E-AA0C79440143" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28AA3967-5B20-4650-BB32-D88FD2C53411" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D063BE4-8A42-477A-A5BA-9F2CAF821EE2" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CC947A5-ECA4-4BC8-8049-37753922E9C4" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D55D51B1-9519-4BF4-8A05-FED70D1D870E" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "086B3DB3-CDD5-45DC-8768-9963955CC499" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "984F6958-1A96-4772-912F-4E6C9522584D" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:2.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1C69EF3-4630-4D94-A73D-EFABD30312CB" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A96B062-B8B5-4BE4-A96A-A833812D1051" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD3EFE62-6F84-4610-8CFA-C28AD689AD97" }, { "criteria": "cpe:2.3:a:softaculous:webuzo:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "352DE3B2-5212-42FB-8A78-6C20077EB8F1" } ], "operator": "OR" } ] } ]