Cross-site scripting (XSS) vulnerability in wpcommentremix.php in WP Comment Remix plugin before 1.4.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the (1) replytotext, (2) quotetext, (3) originallypostedby, (4) sep, (5) maxtags, (6) tagsep, (7) tagheadersep, (8) taglabel, and (9) tagheaderlabel parameters.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://chxsecurity.org/advisories/adv-3-full.txt - | |
References | () http://secunia.com/advisories/32253 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/4492 - | |
References | () http://www.securityfocus.com/archive/1/497313/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/31750 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/45861 - |
Information
Published : 2008-10-24 10:30
Updated : 2024-11-21 00:52
NVD link : CVE-2008-4733
Mitre link : CVE-2008-4733
CVE.ORG link : CVE-2008-4733
JSON object : View
Products Affected
pressography
- wp_comment_remix_plugin
wordpress
- wordpress
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')