CVE-2013-4492

CVSS V2 Medium 4.3 CVSS V3 None
Description
Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.
Overview
  • CVE ID
  • CVE-2013-4492
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2013-12-07T00:55:03
  • Last Modified Date
  • 2023-02-13T04:47:02
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:i18n_project:i18n:*:*:*:*:*:ruby:*:* 1 OR 0.6.5
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:P/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
History
Created Old Value New Value Data Type Notes
2022-05-10 07:13:24 Added to TrackCVE
2022-12-01 21:05:40 2013-12-07T00:55Z 2013-12-07T00:55:03 CVE Published Date updated
2022-12-01 21:05:40 2021-05-04T09:08:19 CVE Modified Date updated
2022-12-01 21:05:40 Modified Vulnerability Status updated
2023-02-02 21:04:02 2023-02-02T20:15:43 CVE Modified Date updated
2023-02-02 21:04:02 Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call. CVE-2013-4492 rubygem-i18n: cross-site scripting flaw in exception handling Description updated
2023-02-02 21:04:09 References updated
2023-02-13 05:06:14 2023-02-13T04:47:02 CVE Modified Date updated
2023-02-13 05:06:14 CVE-2013-4492 rubygem-i18n: cross-site scripting flaw in exception handling Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call. Description updated