Vulnerability Details : CVE-2004-2085
Multiple cross-site scripting (XSS) vulnerabilities in Brad Fears phpCodeCabinet 0.4 and earlier allow remote attackers to inject arbitrary web script or HTML via multiple parameters, including (1) the sid parameter to comments.php, (2) the cid, cf, or rfd parameters to category.php, or the cid parameter to (3) input.php, (4) browse.php, (5) themes/facade/header.php, or (6) themes/phpcc/header.php.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2004-2085
Probability of exploitation activity in the next 30 days: 0.71%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 78 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-2085
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
References for CVE-2004-2085
-
http://www.securityfocus.com/bid/9601
Patch;Vendor Advisory
-
http://sourceforge.net/project/shownotes.php?release_id=214860
Vendor Advisory
-
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/category.php?r1=1.4&r2=1.5
Vendor Advisory
-
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/input.php?r1=1.7&r2=1.8
Vendor Advisory
-
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/phpcc/header.php?r1=1.4&r2=1.5
Vendor Advisory
-
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/comments.php?r1=1.1&r2=1.2
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/15190
-
http://www.securityfocus.com/bid/9645
Patch;Vendor Advisory
-
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/facade/header.php?r1=1.4&r2=1.5
Vendor Advisory
-
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/browse.php?r1=1.5&r2=1.6
Vendor Advisory
-
http://securitytracker.com/id?1009012
Products affected by CVE-2004-2085
- cpe:2.3:a:brad_fears:phpcodecabinet:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:brad_fears:phpcodecabinet:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:brad_fears:phpcodecabinet:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:brad_fears:phpcodecabinet:0.1:*:*:*:*:*:*:*