Multiple cross-site scripting (XSS) vulnerabilities in index.php in AJ Square AJ Article 3.0 allow remote attackers to inject arbitrary web script or HTML via the (1) emailid, (2) fname, (3) lname, (4) company, (5) address1, (6) address2, (7) city, (8) state, (9) zipcode, (10) phone, and (11) fax parameters in an update action. NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.org/1007-exploits/ajarticle-xss.txt - Exploit | |
References | () http://secunia.com/advisories/40560 - Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/14354 - Exploit | |
References | () http://www.osvdb.org/66279 - | |
References | () http://www.securityfocus.com/bid/41576 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/60357 - |
Information
Published : 2010-07-30 20:30
Updated : 2024-11-21 01:17
NVD link : CVE-2010-2917
Mitre link : CVE-2010-2917
CVE.ORG link : CVE-2010-2917
JSON object : View
Products Affected
ajsquare
- aj_article
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')