Description
Multiple cross-site scripting vulnerabilities in FishCart 3.1 allow remote attackers to inject arbitrary web script or HTML via the (1) trackingnum, (2) reqagree, or (3) m parameter to upstracking.php or (4) nlst parameter to display.php. NOTE: the vendor was not able to reproduce some of the reported vectors but believes that they have been addressed. The original researcher is known to be unreliable.
Exploits (2)
References (9)
Core 9
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111530799109755&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/16280
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/457754/100/200/threaded
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/15232/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/20384
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/16281
Various Sources mailing-list
x_refsource_mlist
http://www.fishcart.org/archives/200505/msg00028.html
Exploit x_refsource_misc
http://www.digitalparadox.org/advisories/fishc.txt
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/13499
Scores
EPSS
0.1673
EPSS Percentile
95.0%
Details
CWE
CWE-79
Status
published
Products (1)
fishnet/fishcart
3.1
Published
May 11, 2005
Tracked Since
Feb 18, 2026