Multiple cross-site scripting (XSS) vulnerabilities in templates/example_template.php in AwesomeTemplateEngine allow remote attackers to inject arbitrary web script or HTML via the (1) data[title], (2) data[message], (3) data[table][1][item], (4) data[table][1][url], or (5) data[poweredby] parameter.
References
Configurations
History
21 Nov 2024, 00:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html - Exploit | |
References | () http://securityreason.com/securityalert/3539 - | |
References | () http://securityvulns.ru/Sdocument784.html - Exploit | |
References | () http://websecurity.com.ua/1694/ - Exploit | |
References | () http://www.securityfocus.com/archive/1/485786/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/27125 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/39396 - |
Information
Published : 2008-01-10 00:46
Updated : 2024-11-21 00:41
NVD link : CVE-2008-0190
Mitre link : CVE-2008-0190
CVE.ORG link : CVE-2008-0190
JSON object : View
Products Affected
awesometemplateengine
- awesometemplateengine
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')