Cross-site scripting (XSS) vulnerability in scozbook/add.php in ScozNet ScozBook 1.1 BETA allows remote attackers to inject arbitrary web script or HTML via the (1) username, (2) useremail, (3) aim, (4) msn, (5) sitename and (6) siteaddy variables.
References
Configurations
History
20 Nov 2024, 23:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/8476 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/3781 - | |
References | () http://www.securityfocus.com/archive/1/316747/30/25280/threaded - | |
References | () http://www.securityfocus.com/bid/7235 - | |
References | () http://www.securitytracker.com/id?1006413 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/11658 - |
Information
Published : 2003-12-31 05:00
Updated : 2024-11-20 23:47
NVD link : CVE-2003-1554
Mitre link : CVE-2003-1554
CVE.ORG link : CVE-2003-1554
JSON object : View
Products Affected
scoznet
- scozbook
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')