Vulnerability Details : CVE-2004-0781
Cross-site scripting (XSS) vulnerability in list.cgi in the Icecast internal web server (icecast-server) 1.3.12 and earlier allows remote attackers to inject arbitrary web script via the UserAgent parameter.
Vulnerability category: Cross site scripting (XSS)
Threat overview for CVE-2004-0781
Top countries where our scanners detected CVE-2004-0781
Top open port discovered on systems with this issue
8000
IPs affected by CVE-2004-0781 24
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2004-0781!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2004-0781
Probability of exploitation activity in the next 30 days: 0.21%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 58 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-0781
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
References for CVE-2004-0781
-
http://www.debian.org/security/2004/dsa-541
Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/11021
Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17086
Products affected by CVE-2004-0781
- cpe:2.3:a:icecast:icecast:1.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:icecast:icecast:1.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:icecast:icecast:1.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:icecast:icecast:1.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:icecast:icecast:1.3.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:icecast:icecast:1.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:icecast:icecast:1.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:icecast:icecast:1.3.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:icecast:icecast:1.3.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:icecast:icecast:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:icecast:icecast:1.3.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:icecast:icecast:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:icecast:icecast:1.3.5.1:*:*:*:*:*:*:*