Vulnerability Details : CVE-2003-0615
Cross-site scripting (XSS) vulnerability in start_form() of CGI.pm allows remote attackers to insert web script via a URL that is fed into the form's action parameter.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2003-0615
Probability of exploitation activity in the next 30 days: 1.10%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 84 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2003-0615
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
References for CVE-2003-0615
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A470
-
http://www.securityfocus.com/bid/8231
Patch;Vendor Advisory
- http://www.redhat.com/support/errata/RHSA-2003-256.html
-
http://www.debian.org/security/2003/dsa-371
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000713
-
http://marc.info/?l=bugtraq&m=105880349328877&w=2
-
http://marc.info/?l=bugtraq&m=106018783704468&w=2
-
http://marc.info/?l=full-disclosure&m=105875211018698&w=2
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A307
- http://www.ciac.org/ciac/bulletins/n-155.shtml
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/12669
-
http://securitytracker.com/id?1007234
-
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:084
-
http://www.kb.cert.org/vuls/id/246409
US Government Resource
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101426-1
Products affected by CVE-2003-0615
- cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
- cpe:2.3:a:openpkg:openpkg:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:openpkg:openpkg:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*
- cpe:2.3:a:cgi.pm:cgi.pm:2.75:*:*:*:*:*:*:*
- cpe:2.3:a:cgi.pm:cgi.pm:2.751:*:*:*:*:*:*:*
- cpe:2.3:a:cgi.pm:cgi.pm:2.753:*:*:*:*:*:*:*
- cpe:2.3:a:cgi.pm:cgi.pm:2.76:*:*:*:*:*:*:*
- cpe:2.3:a:cgi.pm:cgi.pm:2.73:*:*:*:*:*:*:*
- cpe:2.3:a:cgi.pm:cgi.pm:2.74:*:*:*:*:*:*:*
- cpe:2.3:a:cgi.pm:cgi.pm:2.93:*:*:*:*:*:*:*
- cpe:2.3:a:cgi.pm:cgi.pm:2.78:*:*:*:*:*:*:*
- cpe:2.3:a:cgi.pm:cgi.pm:2.79:*:*:*:*:*:*:*