Multiple cross-site scripting (XSS) vulnerabilities in Wuzly 2.0 allow remote attackers to inject arbitrary web script or HTML via the Referer header to (1) admin/login.php and (2) admin/404.php; the (3) q parameter to search.php; the (4) theme_name parameter to theme_settings.php, (5) extension_name parameter to extension_settings.php, (6) q parameter to search.php, (7) type parameter to comments.php, sort parameter to (8) pages.php and (9) posts.php, and the (10) type and (11) q parameter to media.php in admin/; the sidebar parameter to (12) add_widget.php and (13) widgets.php, id parameter to (14) category_delete.php, (15) comment.php, (16) page_delete.php, and (17) post_delete.php, (18) type parameter to media.php, and (19) id and (20) sidebar parameter to widget_delete.php in mobile/; and the (21) name, (22) email, (23) website, and (24) comment parameters to index.php; and the (25) username parameter to admin/login.php.
osvdb.org/77914
osvdb.org/77920
osvdb.org/77921
osvdb.org/77922
osvdb.org/77923
osvdb.org/77924
osvdb.org/77925
osvdb.org/77926
osvdb.org/77927
osvdb.org/77928
osvdb.org/77929
osvdb.org/77930
osvdb.org/77931
osvdb.org/77932
osvdb.org/77933
osvdb.org/77934
osvdb.org/77935
osvdb.org/77936
osvdb.org/77937
osvdb.org/77938
secunia.com/advisories/46163
secunia.com/secunia_research/2011-84/
secunia.com/secunia_research/2011-86/
exchange.xforce.ibmcloud.com/vulnerabilities/71899
exchange.xforce.ibmcloud.com/vulnerabilities/71902
exchange.xforce.ibmcloud.com/vulnerabilities/71906