Multiple cross-site scripting (XSS) vulnerabilities in OneWorldStore allow remote attackers to inject arbitrary web script or HTML via the (1) sEmail parameter to owContactUs.asp, (2) bSub parameter to owListProduct.asp, or the (3) Name, (4) Email, or (5) Comment fields in owProductDetail.asp.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=111352017704126&w=2 | |
http://secunia.com/advisories/14969 | Patch Vendor Advisory |
http://securitytracker.com/id?1013720 | Exploit Patch |
http://www.oneworldstore.com/support_security_issue_updates.asp#April_15_2005_DCrab | Vendor Advisory URL Repurposed |
http://www.osvdb.org/15521 | Exploit |
http://www.osvdb.org/15522 | Exploit |
http://www.osvdb.org/15523 | Exploit |
http://www.securityfocus.com/bid/13184 | Exploit Patch |
http://www.securityfocus.com/bid/13185 | Exploit Patch |
http://www.securityfocus.com/bid/13186 | Patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/20096 |
Configurations
History
No history.
Information
Published : 2005-05-02 04:00
Updated : 2024-02-14 01:17
NVD link : CVE-2005-1162
Mitre link : CVE-2005-1162
CVE.ORG link : CVE-2005-1162
JSON object : View
Products Affected
oneworldstore
- oneworldstore
CWE