Description
Multiple cross-site scripting (XSS) vulnerabilities in include/html/header.php in TaskFreak! 0.6.4 allow remote attackers to inject arbitrary web script or HTML via the (1) sContext, (2) sort, (3) dir, and (4) show parameters in a save action to index.php; the (5) dir and (6) show parameters to print_list.php; and the (7) HTTP referer header to rss.php. NOTE: some of these details are obtained from third party information.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by LiquidWorm · textwebappsphp
https://www.exploit-db.com/exploits/35338
exploitdb
WORKING POC
VERIFIED
by LiquidWorm · textwebappsphp
https://www.exploit-db.com/exploits/35337
exploitdb
WORKING POC
VERIFIED
by LiquidWorm · textwebappsphp
https://www.exploit-db.com/exploits/35336
References (6)
Core 6
Core References
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/16158
Exploit x_refsource_misc
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-4990.php
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/65359
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/70877
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/70878
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/43318
Scores
EPSS
0.0117
EPSS Percentile
78.7%
Details
CWE
CWE-79
Status
published
Products (1)
taskfreak/taskfreak\!
0.6.4
Published
Feb 23, 2011
Tracked Since
Feb 18, 2026