21 results (0.013 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in search.cgi in Matt's Script Archive (MSA) Simple Search 1.0 allows remote attackers to inject arbitrary web script or HTML via the terms parameter. NOTE: some of these details are obtained from third party information. Vulnerabilidad de ejecución de secuencias de comandos en search.cgi en Matt's Script Archive (MSA) Simple Search v1.0 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro "terms" NOTA: algunos de estos detalles han sido obtenidos a partir de terceros. • http://osvdb.org/56798 http://packetstormsecurity.org/0908-exploits/simplesearch-xss.txt http://secunia.com/advisories/36178 https://exchange.xforce.ibmcloud.com/vulnerabilities/52311 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in FormMail.pl in Matt Wright FormMail 1.92, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via javascript: URIs in the (1) request and (2) return_link_url parameters. Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en FormMail.pl in Matt Wright FormMail v1.92 y posiblemente anteriores, permiten a atacantes remotos inyectar secuencias de comandos Web o HTML de su elección a través de direcciones URIs en los parámetros (1) request y (2) return_link_url. • https://www.exploit-db.com/exploits/8950 http://secunia.com/advisories/35068 http://www.securityfocus.com/archive/1/503446/100/0/threaded http://www.securityfocus.com/bid/34929 http://www.ush.it/team/ush/hack-formmail_192/adv.txt • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 2

CRLF injection vulnerability in FormMail.pl in Matt Wright FormMail 1.92, and possibly earlier, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the redirect parameter. Vulnerabilidad de inyección CRLF (se refiere a CR (retorno de carro) y LF (salto de línea)) en FormMail.pl en Matt Wright FormMail v1.92 y posiblemente anteriores, permite a atacantes remotos inyectar cabeceras HTTP de su elección y llevar a cabo ataques de separación de respuesta HTTP a través del parámetro redirect. • https://www.exploit-db.com/exploits/8950 http://secunia.com/advisories/35068 http://www.securityfocus.com/archive/1/503446/100/0/threaded http://www.securityfocus.com/bid/34929 http://www.ush.it/team/ush/hack-formmail_192/adv.txt • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in Matt Wright Guestbook 2.3.1 allows remote attackers to execute arbitrary web script or HTML via the (1) url, (2) city, (3) state, or (4) country parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information, although it is likely that they are the result of post-disclosure analysis. • http://secunia.com/advisories/19586 http://www.vupen.com/english/advisories/2006/1287 https://exchange.xforce.ibmcloud.com/vulnerabilities/25697 •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in Matt Wright Guestbook 2.3.1 allows remote attackers to execute arbitrary web script or HTML via the (1) Your Name, (2) E-Mail, or (3) Comments fields when posting a message. • https://www.exploit-db.com/exploits/27594 http://liz0zim.no-ip.org/mattguestbook.html http://secunia.com/advisories/19586 http://securityreason.com/securityalert/681 http://www.osvdb.org/24479 http://www.securityfocus.com/archive/1/430356/100/0/threaded http://www.securityfocus.com/bid/17438 http://www.vupen.com/english/advisories/2006/1287 https://exchange.xforce.ibmcloud.com/vulnerabilities/25697 •