Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2004-2020
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-31 Dec, 2004 | 05:00
Updated At-03 Apr, 2025 | 01:03

Multiple cross-site scripting (XSS) vulnerabilities in Php-Nuke 6.x through 7.3 allow remote attackers to inject arbitrary HTML or web script into the (1) optionbox parameter in the News module, (2) date parameter in the Statistics module, (3) year, month, and month_1 parameters in the Stories_Archive module, (4) mode, order, and thold parameters in the Surveys module, or (5) a SQL statement to index.php, as processed by mainfile.php.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

francisco_burzi
francisco_burzi
>>php-nuke>>6.0
cpe:2.3:a:francisco_burzi:php-nuke:6.0:*:*:*:*:*:*:*
francisco_burzi
francisco_burzi
>>php-nuke>>6.5
cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*
francisco_burzi
francisco_burzi
>>php-nuke>>6.5_beta1
cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*
francisco_burzi
francisco_burzi
>>php-nuke>>6.5_final
cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*
francisco_burzi
francisco_burzi
>>php-nuke>>6.5_rc1
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*
francisco_burzi
francisco_burzi
>>php-nuke>>6.5_rc2
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*
francisco_burzi
francisco_burzi
>>php-nuke>>6.5_rc3
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*
francisco_burzi
francisco_burzi
>>php-nuke>>6.6
cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*
francisco_burzi
francisco_burzi
>>php-nuke>>6.7
cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*
francisco_burzi
francisco_burzi
>>php-nuke>>6.9
cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*
francisco_burzi
francisco_burzi
>>php-nuke>>7.0
cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*
francisco_burzi
francisco_burzi
>>php-nuke>>7.0_final
cpe:2.3:a:francisco_burzi:php-nuke:7.0_final:*:*:*:*:*:*:*
francisco_burzi
francisco_burzi
>>php-nuke>>7.1
cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*
francisco_burzi
francisco_burzi
>>php-nuke>>7.2
cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*
francisco_burzi
francisco_burzi
>>php-nuke>>7.3
cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://marc.info/?l=bugtraq&m=108482957715299&w=2cve@mitre.org
N/A
http://secunia.com/advisories/11625cve@mitre.org
Exploit
http://www.osvdb.org/6225cve@mitre.org
N/A
http://www.osvdb.org/6226cve@mitre.org
N/A
http://www.securityfocus.com/bid/10367cve@mitre.org
Exploit
http://www.waraxe.us/index.php?modname=sa&id=29cve@mitre.org
Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/16172cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=108482957715299&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/11625af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.osvdb.org/6225af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/6226af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/10367af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.waraxe.us/index.php?modname=sa&id=29af854a3a-2127-422b-91ae-364da2661108
Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/16172af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://marc.info/?l=bugtraq&m=108482957715299&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/11625
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://www.osvdb.org/6225
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/6226
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/10367
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://www.waraxe.us/index.php?modname=sa&id=29
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/16172
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=108482957715299&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/11625
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://www.osvdb.org/6225
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/6226
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/10367
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://www.waraxe.us/index.php?modname=sa&id=29
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/16172
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Change History
0Changes found

Details not found