CVE-2013-469227.12.2019, 17:15Xorbin Analog Flash Clock 1.0 extension for Joomia has XSSCross-site ScriptingEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST6.1 MEDIUMNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NmitreCNA------CVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 86%VendorProductVersionxorbinanalog_flash_clock1.0𝑥= Vulnerable software versionsKnown Exploits!http://packetstormsecurity.com/files/122224/Xorbin-Analog-Flash-Clock-1.0-For-Joomla-XSS.htmlhttp://packetstormsecurity.com/files/122224/Xorbin-Analog-Flash-Clock-1.0-For-Joomla-XSS.htmlCommon Weakness EnumerationCWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Referenceshttp://packetstormsecurity.com/files/122224/Xorbin-Analog-Flash-Clock-1.0-For-Joomla-XSS.htmlhttp://www.securityfocus.com/bid/60860https://exchange.xforce.ibmcloud.com/vulnerabilities/85418http://packetstormsecurity.com/files/122224/Xorbin-Analog-Flash-Clock-1.0-For-Joomla-XSS.htmlhttp://www.securityfocus.com/bid/60860https://exchange.xforce.ibmcloud.com/vulnerabilities/85418