Show plain JSON{"id": "CVE-2013-7032", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2014-02-14T19:55:25.263", "references": [{"url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0074.html", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/101080", "source": "cve@mitre.org"}, {"url": "http://www.livezilla.net/board/index.php?/topic/163-livezilla-changelog", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89809", "source": "cve@mitre.org"}, {"url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0074.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/101080", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.livezilla.net/board/index.php?/topic/163-livezilla-changelog", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89809", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the web based operator client in LiveZilla before 5.1.2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) name of an uploaded file or (2) customer name in a resource created from an uploaded file, a different vulnerability than CVE-2013-7003."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en el cliente de operador basado en web en LiveZilla anterior a 5.1.2.1 permiten a atacantes remotos inyectar script Web o HTML arbitrarios a trav\u00e9s del (1) nombre de un archivo cargado o (2) nombre de cliente en un recurso creado desde un archivo cargado, una vulnerabilidad diferente a CVE-2013-7003."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:livezilla:livezilla:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8685C528-1012-467B-9011-C668ABFF4FF1", "versionEndIncluding": "5.1.2.0"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:3.1.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56789521-4DD0-4FE8-80E4-9D99BDD43551"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:3.2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8284B387-D399-49D1-921C-414A8B9E6DF6"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:4.0.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D97BE25-92A1-4F57-B433-0650BEC6A714"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:4.0.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D38AA0A9-D234-4366-BCA2-7E8D44B5AE3C"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:4.0.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE5118FB-A7DB-4E40-8B65-F72BA94FADF6"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:4.1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3585416-E7D6-4F2E-974F-6033B1EA493D"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:4.1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A015EC43-FEE9-401E-879E-5075E98E7566"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:4.2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "171BA61E-BC9A-46E7-B69A-CDC01D6B1CC7"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:4.2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "013B3FB8-47DB-4C27-894E-E837200D267F"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:5.0.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4F8D1A5-B008-4D92-9522-FD9B82A5C6F3"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:5.0.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C198E0EB-5E32-4952-9297-BC05C2E8EC77"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:5.0.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E252F349-6B4C-4DD0-B566-6F701F5D639F"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:5.0.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF76D3A5-3926-40B2-85A2-DF088428CB9C"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:5.0.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BF03B88-78BB-447E-A8E3-3053DEAB5BA9"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:5.1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5857ABFC-FA81-4D0B-9CF1-EE64422A4B96"}, {"criteria": "cpe:2.3:a:livezilla:livezilla:5.1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26D87246-BC8B-4B74-8565-232422517E93"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}