Multiple cross-site scripting (XSS) vulnerabilities in the comment feature in Skeletonz CMS 1.0, when the Blog plugin is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) Name, (2) Website, and (3) Email parameters. NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 01:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.org/files/view/96151/skeletonzcms-xss.txt - Exploit | |
References | () http://secunia.com/advisories/42385 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/8081 - | |
References | () http://www.exploit-db.com/exploits/15625 - Exploit | |
References | () http://www.osvdb.org/69514 - | |
References | () http://www.securityfocus.com/bid/45081 - Exploit |
Information
Published : 2011-02-16 03:00
Updated : 2024-11-21 01:21
NVD link : CVE-2010-4734
Mitre link : CVE-2010-4734
CVE.ORG link : CVE-2010-4734
JSON object : View
Products Affected
amix
- skeletonz_cms_1.0
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')