Multiple cross-site scripting (XSS) vulnerabilities submit.asp in ASPScriptz Guest Book 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) GBOOK_UNAME, (2) GBOOK_EMAIL, (3) GBOOK_CITY, (4) GBOOK_COU, (5) GBOOK_WWW, and (6) GBOOK_MESS form fields.
References
Configurations
History
21 Nov 2024, 00:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://colander.altervista.org/advisory/ASzGB.txt - Exploit | |
References | () http://secunia.com/advisories/20416 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/1056 - | |
References | () http://www.securityfocus.com/archive/1/436028/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/18285 - | |
References | () http://www.vupen.com/english/advisories/2006/2150 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26944 - |
Information
Published : 2006-06-07 10:02
Updated : 2024-11-21 00:12
NVD link : CVE-2006-2882
Mitre link : CVE-2006-2882
CVE.ORG link : CVE-2006-2882
JSON object : View
Products Affected
aspscriptz
- aspscriptz_guest_book
CWE