{"id":"CVE-2013-2204","details":"moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character.","modified":"2026-04-16T01:47:51.676317562Z","published":"2013-07-08T20:55:01Z","withdrawn":"2026-01-27T04:13:10.935356Z","references":[{"type":"ADVISORY","url":"http://wordpress.org/news/2013/06/wordpress-3-5-2/"},{"type":"ADVISORY","url":"http://www.debian.org/security/2013/dsa-2718"},{"type":"FIX","url":"https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2dcf2f3f37dbfab0"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=976784"},{"type":"WEB","url":"http://codex.wordpress.org/Version_3.5.2"}],"schema_version":"1.7.3"}