How to Buy
This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote web server contains an application that is vulnerable to a
cross-site scripting attack.
The remote host is running Fusebox, a framework for building web-based
applications in Cold Fusion and PHP.
The installed web application appears to have been created using
Fusebox in such a way that it fails to sanitize user-supplied input to
the 'fuseaction' parameter before using it in dynamically-generated
Note that this flaw may not be specific to the Fusebox framework, per
se, but instead be an implementation issue since Fusebox itself does
not generate any HTML, but lets the developer control all output.
See also :
Unknown at this time.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 4.3
Public Exploit Available : true
Family: CGI abuses : XSS
Nessus Plugin ID: 19383 (fusebox_fuseaction_xss.nasl)
Bugtraq ID: 14460
CVE ID: CVE-2005-2480
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.