Description
Multiple cross-site scripting (XSS) vulnerabilities in OneWorldStore allow remote attackers to inject arbitrary web script or HTML via the (1) sEmail parameter to owContactUs.asp, (2) bSub parameter to owListProduct.asp, or the (3) Name, (4) Email, or (5) Comment fields in owProductDetail.asp.
Exploits (2)
References (11)
Core 11
Core References
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/13184
Exploit, Patch vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1013720
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/15523
Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/13186
Vendor Advisory, URL Repurposed x_refsource_confirm
http://www.oneworldstore.com/support_security_issue_updates.asp#April_15_2005_DCrab
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/15521
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/20096
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111352017704126&w=2
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/15522
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/14969
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/13185
Scores
EPSS
0.0585
EPSS Percentile
90.6%
Details
Status
published
Products (1)
oneworldstore/oneworldstore
Published
May 02, 2005
Tracked Since
Feb 18, 2026