Description
Multiple cross-site scripting (XSS) vulnerabilities in Rialto 1.6 allow remote attackers to inject arbitrary web script or HTML via the (1) cat parameter to (a) listmain.asp or (b) searchmain.asp, the (2) the Keyword parameter to (c) searchkey.asp, or the (3) refno parameter to (d) forminfo.asp.
Exploits (4)
exploitdb
WRITEUP
VERIFIED
by laurent gaffie · textwebappsasp
https://www.exploit-db.com/exploits/29116
exploitdb
WRITEUP
VERIFIED
by laurent gaffie · textwebappsasp
https://www.exploit-db.com/exploits/29115
exploitdb
WRITEUP
VERIFIED
by laurent gaffie · textwebappsasp
https://www.exploit-db.com/exploits/29114
exploitdb
WRITEUP
VERIFIED
by laurent gaffie · textwebappsasp
https://www.exploit-db.com/exploits/29117
References (6)
Core 6
Core References
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/4630
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/2143
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23049
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/30425
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/452112/100/0/threaded
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/21191
Scores
EPSS
0.0548
EPSS Percentile
90.2%
Details
Status
published
Products (1)
grandora/rialto
1.6
Published
Jan 13, 2007
Tracked Since
Feb 18, 2026