Cross-site scripting (XSS) vulnerability in index.php for TOPo 2.2 (2.2.178) allows remote attackers to inject arbitrary web script or HTML via the (1) m, (2) s, (3) ID, or (4) t parameters, or the (5) field name, (6) Your Web field, or (7) email field in the comments section.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://lostmon.blogspot.com/2005/05/topo-22-multiple-variable-fields-xss.html - Patch | |
References | () http://secunia.com/advisories/15325 - | |
References | () http://securitytracker.com/id?1014016 - | |
References | () http://www.osvdb.org/16699 - Exploit | |
References | () http://www.securityfocus.com/bid/13700 - Exploit | |
References | () http://www.securityfocus.com/bid/13701 - |
Information
Published : 2005-05-24 04:00
Updated : 2024-11-20 23:57
NVD link : CVE-2005-1715
Mitre link : CVE-2005-1715
CVE.ORG link : CVE-2005-1715
JSON object : View
Products Affected
ej3
- topo
CWE