CVE-2013-7385

LiveZilla 5.1.2.1 and earlier includes the MD5 hash of the operator password in plaintext in Javascript code that is generated by lz/mobile/chat.php, which allows remote attackers to obtain sensitive information and gain privileges by accessing the loginName and loginPassword variables using an independent cross-site scripting (XSS) attack.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7033.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 62%
VendorProductVersion
livezillalivezilla
𝑥
≤ 5.1.2.1
livezillalivezilla
5.0.1.0
livezillalivezilla
5.0.1.1
livezillalivezilla
5.0.1.2
livezillalivezilla
5.0.1.3
livezillalivezilla
5.0.1.4
livezillalivezilla
5.1.0.0
livezillalivezilla
5.1.1.0
livezillalivezilla
5.1.2.0
𝑥
= Vulnerable software versions
Common Weakness Enumeration