[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2009-4168Date: (C)2009-12-02   (M)2023-12-22


Cross-site scripting (XSS) vulnerability in Roy Tanck tagcloud.swf, as used in the WP-Cumulus plugin before 1.23 for WordPress and the Joomulus module 2.0 and earlier for Joomla!, allows remote attackers to inject arbitrary web script or HTML via the tagcloud parameter in a tags action. Cross-site scripting (XSS) vulnerability in tagcloud.swf in the WP-Cumulus Plug-in before 1.23 for WordPress allows remote attackers to inject arbitrary web script or HTML via the tagcloud parameter.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
http://www.securityfocus.com/archive/1/508071/100/0/threaded
http://www.securityfocus.com/archive/1/508606/100/0/threaded
http://www.securityfocus.com/archive/1/508833/100/0/threaded
BID-37100
BID-37479
SECUNIA-37483
SECUNIA-38161
ADV-2009-3322
http://packetstormsecurity.org/1001-exploits/joomlajvclouds-xss.txt
http://websecurity.com.ua/3665/
http://websecurity.com.ua/3789/
http://websecurity.com.ua/3801/
http://websecurity.com.ua/3839/
http://www.roytanck.com/2009/11/15/wp-cumulus-updated-to-address-yet-another-security-issue/
joomulus-tagcloud-xss(55156)
wpcumulus-tagcloud-xss(54397)

CPE    1
cpe:/a:wordpress:wordpress
CWE    1
CWE-79

© SecPod Technologies