Multiple cross-site scripting (XSS) vulnerabilities in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) text parameter to (a) warning.php, (b) notice.php, and (c) inset.php in view/sniplets/, and possibly (d) modules/execute.php; the (2) url parameter to (e) view/admin/submenu.php; and the (3) page parameter to (f) view/admin/pager.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/29099 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/3706 - | |
References | () http://www.securityfocus.com/archive/1/488734/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/27985 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/40830 - | |
References | () https://www.exploit-db.com/exploits/5194 - |
Information
Published : 2008-02-28 19:44
Updated : 2024-11-21 00:43
NVD link : CVE-2008-1061
Mitre link : CVE-2008-1061
CVE.ORG link : CVE-2008-1061
JSON object : View
Products Affected
wordpress
- sniplets_plugin
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')