2 results (0.004 seconds)

CVSS: 4.3EPSS: 81%CPEs: 1EXPL: 3

Cross-site scripting (XSS) vulnerability in the Nullsoft ShoutcastServer 1.9.7 allows remote attackers to inject arbitrary web script or HTML via the top-level URI on the Incoming interface (port 8001/tcp), which is not properly handled in the administrator interface when viewing the log file. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Nullsoft ShoutcastServer 1.9.7 permite a atacantes remotos inyectar scripts web o HTML de su elección mediante la URI top-level en el interfaz Incoming (puerto tcp/8001), que no es gestionado apropiadamente en la interfaz de administrador cuando se visualiza el fichero de trazas. • https://www.exploit-db.com/exploits/29685 http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0604.html http://osvdb.org/33793 http://secunia.com/advisories/24323 http://www.securityfocus.com/archive/1/461474/100/0/threaded http://www.securityfocus.com/bid/22742 http://www.vupen.com/english/advisories/2007/0775 https://exchange.xforce.ibmcloud.com/vulnerabilities/32726 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Nullsoft SHOUTcast server stores the administrative password in plaintext in a configuration file (sc_serv.conf), which could allow a local user to gain administrative privileges on the server. • http://www.securityfocus.com/archive/1/24852 •