Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2011-0050
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Cross-site scripting (XSS) vulnerability in the nonjs interface (interfaces/nonjs.pm) in CGI:IRC before 0.5.10 allows remote attackers to inject arbitrary web script or HTML via the R parameter..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- None
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:cgiirc:cgi\:irc:0.4.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.3.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.3.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.3.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.3.3_pre1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.5.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.5.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.3.5b:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.4.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.5.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.3.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.3.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.5.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.3.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.5.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.5.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.2.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.3_pre2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.5.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.4.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.3.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.5.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:cgiirc:cgi\:irc:0.3_pre1:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.vupen.com/english/advisories/2011/0346
- http://secunia.com/advisories/43217
- http://www.debian.org/security/2011/dsa-2158
- http://osvdb.org/70844
- http://sourceforge.net/mailarchive/message.php?msg_id=27024589
- http://securityreason.com/securityalert/8097
- http://www.securityfocus.com/archive/1/516328/100/0/threaded