Description
Cross-site scripting (XSS) vulnerability in ProfileView.aspx in mojoPortal 2.3.4.3 and 2.3.5.1 allows remote attackers to inject arbitrary web script or HTML via the User ID parameter. NOTE: some of these details are obtained from third party information.
Exploits (1)
References (8)
Core 8
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/41481
Exploit x_refsource_misc
http://packetstormsecurity.org/1009-advisories/moaub16-mojoportal.pdf
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/43268
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/68059
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/61835
Exploit x_refsource_misc
http://packetstormsecurity.org/1009-exploits/moaub-mojoportal.txt
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/15018
Patch, Vendor Advisory x_refsource_confirm
http://www.mojoportal.com/mojoportal-2352-released.aspx
Scores
EPSS
0.0804
EPSS Percentile
92.1%
Details
CWE
CWE-79
Status
published
Products (2)
sourcetreesolutions/mojoportal
2.3.4.3
sourcetreesolutions/mojoportal
2.3.5.1
Published
Sep 24, 2010
Tracked Since
Feb 18, 2026