Security for everyone

CVE-2013-5979 Scanner

Detects 'Directory Traversal' vulnerability in Spring Signage Xibo affects v. 1.2.x before 1.2.3 and 1.4.x before 1.4.2.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one




Spring Signage Xibo is a digital signage software that allows users to display various content on screens, including digital menus, advertisements, and informational displays. It is used by businesses, schools, and other organizations to communicate important information to their audiences. With its user-friendly interface and versatile features, Xibo has become a popular choice for digital signage solutions. 

One drawback of the software, however, is that it is vulnerable to a directory traversal exploit known as CVE-2013-5979. This exploit allows attackers to read arbitrary files by using a ".." (dot dot) command in the p parameter on the index.php page. This vulnerability can enable attackers to access sensitive information such as user credentials, configuration files, and other important data.

If this vulnerability is exploited, it can lead to a variety of consequences. Attackers can gain unauthorized access to the system and steal sensitive information. They can also manipulate the system by deleting or modifying important files, causing a disruption in the system's operations. The breach of data can lead to a loss of trust from customers or stakeholders, and legal ramifications in the form of lawsuits and fines.

Thanks to the pro features of the platform, individuals and organizations can easily and quickly learn about vulnerabilities in their digital assets. By utilizing this platform, they can stay informed about potential risks and take proactive measures to protect their systems from exploitation. By investing in cybersecurity best practices, they can maintain the integrity of their digital assets and safeguard against the potentially devastating effects of a security breach.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture