Cross-site scripting (XSS) vulnerability in assess.php in evalSMSI 2.1.03 allows remote attackers to inject arbitrary web script or HTML via the reports comment box in a continue_assess action. NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 01:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.org/1002-exploits/corelan-10-008-evalmsi.txt - Exploit | |
References | () http://secunia.com/advisories/38478 - Vendor Advisory | |
References | () http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-008-evalmsi-2-1-03-multiple-vulnerabilities/ - | |
References | () http://www.osvdb.org/62178 - | |
References | () http://www.securityfocus.com/archive/1/509370/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/38116 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/56154 - |
Information
Published : 2010-02-11 17:30
Updated : 2024-11-21 01:12
NVD link : CVE-2010-0615
Mitre link : CVE-2010-0615
CVE.ORG link : CVE-2010-0615
JSON object : View
Products Affected
myshell
- evalsmsi
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')