Multiple cross-site scripting (XSS) vulnerabilities in artpublic/recommandation/index.php in Artiphp CMS 5.5.0 Neo (r422) allow remote attackers to inject arbitrary web script or HTML via the (1) add_img_name_post, (2) asciiart_post, (3) expediteur, (4) titre_sav, or (5) z39d27af885b32758ac0e7d4014a61561 parameter.
References
Configurations
History
21 Nov 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.org/files/112804/Artiphp-CMS-5.5.0-Cross-Site-Scripting.html - | |
References | () http://secunia.com/advisories/49195 - Vendor Advisory | |
References | () http://www.osvdb.org/81990 - | |
References | () http://www.securityfocus.com/bid/53586 - Exploit | |
References | () http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5090.php - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/75689 - |
Information
Published : 2012-05-21 18:55
Updated : 2024-11-21 01:39
NVD link : CVE-2012-2906
Mitre link : CVE-2012-2906
CVE.ORG link : CVE-2012-2906
JSON object : View
Products Affected
artiphp
- artiphp_cms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')