Vulnerability Description
Cross-site scripting (XSS) vulnerability in upload.php in Rapidleech rev.36 and earlier allows remote attackers to inject arbitrary web script or HTML via the uploaded parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rapidleech | Rapidleech | rev36 |
Related Weaknesses (CWE)
References
- http://osvdb.org/52754
- http://secunia.com/advisories/34300Vendor Advisory
- http://security.bkis.vn/?p=345
- http://www.securityfocus.com/archive/1/501854/100/0/threaded
- http://www.securityfocus.com/bid/34119
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49257
- http://osvdb.org/52754
- http://secunia.com/advisories/34300Vendor Advisory
- http://security.bkis.vn/?p=345
- http://www.securityfocus.com/archive/1/501854/100/0/threaded
- http://www.securityfocus.com/bid/34119
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49257
FAQ
What is CVE-2009-1091?
CVE-2009-1091 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Cross-site scripting (XSS) vulnerability in upload.php in Rapidleech rev.36 and earlier allows remote attackers to inject arbitrary web script or HTML via the uploaded parameter.
How severe is CVE-2009-1091?
CVE-2009-1091 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-1091?
Check the references section above for vendor advisories and patch information. Affected products include: Rapidleech Rapidleech.