Vulnerability Details : CVE-2005-3020
Multiple cross-site scripting (XSS) vulnerabilities in vBulletin before 3.0.9 allow remote attackers to inject arbitrary web script or HTML via the (1) group parameter to css.php, (2) redirect parameter to index.php, (3) email parameter to user.php, (4) goto parameter to language.php, (5) orderby parameter to modlog.php, and the (6) hex, (7) rgb, or (8) expandset parameter to template.php.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2005-3020
Probability of exploitation activity in the next 30 days: 1.08%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 82 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-3020
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
References for CVE-2005-3020
Products affected by CVE-2005-3020
- cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.9:*:*:*:*:*:*:*