Description
Multiple cross-site scripting (XSS) vulnerabilities in Active Auction House allow remote attackers to inject arbitrary web script or HTML via the (1) ReturnURL, (2) password, (3) username parameter, (4) ReturnURL parameter to account.asp, (5) Table, (6) Title parameter to sendpassword.asp, or (7) itemid to watchthisitem.asp.
Exploits (4)
References (12)
Core 12
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/15287
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/13038
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/15286
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/13036
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/13039
Exploit vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/alerts/2005/Apr/1013649.html
Various Sources x_refsource_misc
http://digitalparadox.org/advisories/aass.txt
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111280834000432&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/15284
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/15285
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/19975
Exploit, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/14839
Scores
EPSS
0.0218
EPSS Percentile
84.4%
Details
Status
published
Products (1)
active_web_softwares/active_auction_house
7.1
Published
May 02, 2005
Tracked Since
Feb 18, 2026