A vulnerability, which was classified as problematic, has been found in Pro2col Stingray FTS. The manipulation of the argument Username leads to cross site scripting. The attack may be initiated remotely. It is recommended to upgrade the affected component. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link | Resource |
---|---|
http://seclists.org/bugtraq/2008/Sep/0157.html | Exploit Mailing List Third Party Advisory |
https://vuldb.com/?id.3809 | Permissions Required |
http://seclists.org/bugtraq/2008/Sep/0157.html | Exploit Mailing List Third Party Advisory |
https://vuldb.com/?id.3809 | Permissions Required |
Configurations
History
21 Nov 2024, 00:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.5 |
References | () http://seclists.org/bugtraq/2008/Sep/0157.html - Exploit, Mailing List, Third Party Advisory | |
References | () https://vuldb.com/?id.3809 - Permissions Required |
07 Nov 2023, 02:01
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability, which was classified as problematic, has been found in Pro2col Stingray FTS. The manipulation of the argument Username leads to cross site scripting. The attack may be initiated remotely. It is recommended to upgrade the affected component. NOTE: This vulnerability only affects products that are no longer supported by the maintainer |
Information
Published : 2022-03-28 21:15
Updated : 2024-11-21 00:43
NVD link : CVE-2008-10001
Mitre link : CVE-2008-10001
CVE.ORG link : CVE-2008-10001
JSON object : View
Products Affected
pro2col
- stingray_fts