// For flags

CVE-2012-5233

 

Severity Score

2.1
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Cross-site scripting (XSS) vulnerability in the stickynote module before 7.x-1.1 for Drupal allows remote authenticated users with edit stickynotes privileges to inject arbitrary web script or HTML via unspecified vecotrs.

Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en el módulo stickynote anteriores a v7.x-1.1 para Drupal, permite a usuarios remotos autenticados, con privilegios de edición de stickynotes, inyectar secuencias de comandos web o HTML a través de vectores no especificados.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-10-01 CVE Reserved
  • 2012-10-01 CVE Published
  • 2024-09-16 CVE Updated
  • 2024-09-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Luke Herrington
Search vendor "Luke Herrington"
Stickynote
Search vendor "Luke Herrington" for product "Stickynote"
7.x-1.0
Search vendor "Luke Herrington" for product "Stickynote" and version "7.x-1.0"
-
Affected
in Drupal
Search vendor "Drupal"
Drupal
Search vendor "Drupal" for product "Drupal"
--
Safe
Luke Herrington
Search vendor "Luke Herrington"
Stickynote
Search vendor "Luke Herrington" for product "Stickynote"
7.x-1.x
Search vendor "Luke Herrington" for product "Stickynote" and version "7.x-1.x"
dev
Affected
in Drupal
Search vendor "Drupal"
Drupal
Search vendor "Drupal" for product "Drupal"
--
Safe