Multiple cross-site scripting (XSS) vulnerabilities in osTicket allow remote attackers to inject arbitrary web script or HTML via (1) the t parameter to view.php, (2) the osticket_title parameter to header.php, (3) the em parameter to admin_login.php, (4) the e parameter to user_login.php, (5) the err parameter to open_submit.php, or (6) the name and subject fields when adding a ticket.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/15216 - Exploit | |
References | () http://www.gulftech.org/?node=research&article_id=00071-05022005 - Exploit | |
References | () http://www.osvdb.org/16270 - | |
References | () http://www.osvdb.org/16271 - | |
References | () http://www.osvdb.org/16272 - | |
References | () http://www.osvdb.org/16273 - | |
References | () http://www.osvdb.org/16274 - |
Information
Published : 2005-05-03 04:00
Updated : 2024-11-20 23:57
NVD link : CVE-2005-1436
Mitre link : CVE-2005-1436
CVE.ORG link : CVE-2005-1436
JSON object : View
Products Affected
osticket
- osticket
CWE