Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2008-1468
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Cross-site scripting (XSS) vulnerability in namazu.cgi in Namazu before 2.0.18 allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded input, related to failure to set the charset, a different vector than CVE-2004-1318 and CVE-2001-1350. NOTE: some of these details are obtained from third party information..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- None
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:namazu:namazu:2.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:namazu:namazu:2.0.13:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:namazu:namazu:2.0.14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:namazu:namazu:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:namazu:namazu:2.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:namazu:namazu:2.0.16:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:namazu:namazu:2.0.15:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:namazu:namazu:1.3.0.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:namazu:namazu:2.0.12:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://jvn.jp/jp/JVN%2300892830/index.html
- http://www.namazu.org/security.html.en
- http://secunia.com/advisories/29386
- http://www.securityfocus.com/bid/28380
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00575.html
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00654.html
- http://secunia.com/advisories/29561
- http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
- http://secunia.com/advisories/31687
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444
- http://secunia.com/advisories/39645
- http://marc.info/?l=bugtraq&m=127239985506823&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41360