CVE-2008-7043

Freshscripts Fresh Email Script - XSS

Title source: rule
STIX 2.1

Description

Cross-site scripting (XSS) vulnerability in register.php in FreshScripts Fresh Email Script 1.0 through 1.11 allows remote attackers to inject arbitrary web script or HTML via the Email parameter. NOTE: this can be leveraged to modify cookies and conduct session fixation attacks.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Don · textwebappsphp
https://www.exploit-db.com/exploits/7080

References (6)

Core 6
Core References
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/3096
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/46529
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/32642
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/49849
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7080
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/32241

Scores

EPSS 0.0569
EPSS Percentile 90.4%

Details

CWE
CWE-79
Status published
Products (2)
freshscripts/fresh_email_script 1.0
freshscripts/fresh_email_script 1.11
Published Aug 24, 2009
Tracked Since Feb 18, 2026