Multiple cross-site scripting (XSS) vulnerabilities in wp-login.php in the Register Plus plugin 3.5.1 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) firstname, (2) lastname, (3) website, (4) aim, (5) yahoo, (6) jabber, (7) about, (8) pass1, and (9) pass2 parameters in a register action.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/69491 - | |
References | () http://packetstormsecurity.org/files/view/96143/registerplus-xss.txt - Exploit | |
References | () http://secunia.com/advisories/42360 - Vendor Advisory | |
References | () http://websecurity.com.ua/4539 - Exploit | |
References | () http://www.securityfocus.com/archive/1/514903/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/45057 - |
Information
Published : 2010-12-06 13:37
Updated : 2024-11-21 01:20
NVD link : CVE-2010-4402
Mitre link : CVE-2010-4402
CVE.ORG link : CVE-2010-4402
JSON object : View
Products Affected
devbits
- register-plus
wordpress
- wordpress
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')