Vulnerability Details : CVE-2005-3025
Multiple cross-site scripting (XSS) vulnerabilities in vBulletin 3.0.7 and earlier allow remote attackers to inject arbitrary web script or HTML via the loc parameter to (1) modcp/index.php or (2) admincp/index.php, or the ip parameter to (3) modcp/user.php or (4) admincp/usertitle.php.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2005-3025
Probability of exploitation activity in the next 30 days: 0.22%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 59 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-3025
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
References for CVE-2005-3025
- http://marc.info/?l=bugtraq&m=112732980702939&w=2
-
http://morph3us.org/advisories/20050917-vbulletin-3.0.7.txt
Exploit;Patch;Vendor Advisory
Products affected by CVE-2005-3025
- cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*