3 results (0.011 seconds)

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in Matt Wright Guestbook 2.3.1 allows remote attackers to execute arbitrary web script or HTML via the (1) Your Name, (2) E-Mail, or (3) Comments fields when posting a message. • https://www.exploit-db.com/exploits/27594 http://liz0zim.no-ip.org/mattguestbook.html http://secunia.com/advisories/19586 http://securityreason.com/securityalert/681 http://www.osvdb.org/24479 http://www.securityfocus.com/archive/1/430356/100/0/threaded http://www.securityfocus.com/bid/17438 http://www.vupen.com/english/advisories/2006/1287 https://exchange.xforce.ibmcloud.com/vulnerabilities/25697 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in Matt Wright Guestbook 2.3.1 allows remote attackers to execute arbitrary web script or HTML via the (1) url, (2) city, (3) state, or (4) country parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information, although it is likely that they are the result of post-disclosure analysis. • http://secunia.com/advisories/19586 http://www.vupen.com/english/advisories/2006/1287 https://exchange.xforce.ibmcloud.com/vulnerabilities/25697 •

CVSS: 7.5EPSS: 94%CPEs: 2EXPL: 5

guestbook.pl cleanses user-inserted SSI commands by removing text between "<!--" and "-->" separators, which allows remote attackers to execute arbitrary commands when guestbook.pl is run on Apache 1.3.9 and possibly other versions, since Apache allows other closing sequences besides "-->". • https://www.exploit-db.com/exploits/16914 https://www.exploit-db.com/exploits/9907 https://github.com/siunam321/CVE-1999-1053-PoC http://www.securityfocus.com/archive/1/33674 http://www.securityfocus.com/archive/82/27296 http://www.securityfocus.com/archive/82/27560 http://www.securityfocus.com/bid/776 •