CVE-2013-7033
LiveZilla before 5.1.2.1 includes the operator password in plaintext in Javascript code that is generated by lz/mobile/chat.php, which might allow remote attackers to obtain sensitive information and gain privileges by accessing the loginName and loginPassword variables using an independent cross-site scripting (XSS) attack.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0025 (0.3%)
Percentile: 48.2%
EPSS: 2026-05-06
Affects
livezilla:livezillaTechnical description
LiveZilla before 5.1.2.1 includes the operator password in plaintext in Javascript code that is generated by lz/mobile/chat.php, which might allow remote attackers to obtain sensitive information and gain privileges by accessing the loginName and loginPassword variables using an independent cross-site scripting (XSS) attack.
Published: 5/19/2014, 2:55:09 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://forums.livezilla.net/index.php?/topic/163-livezilla-changelog/
- http://packetstormsecurity.com/files/124444/LiveZilla-5.1.2.0-Insecure-Password-Storage.html
- http://forums.livezilla.net/index.php?/topic/163-livezilla-changelog/
- http://packetstormsecurity.com/files/124444/LiveZilla-5.1.2.0-Insecure-Password-Storage.html