Wernhart Guestbook suffers from multiple cross site scripting vulnerabilities.
4820d9b3bbc1b29a329d2216f81ade2abc984e93acdc4cc34737f4b08ff77559
New eVuln Advisory:
Multiple XSS in Wernhart Guestbook
Summary: https://evuln.com/vulns/150/summary.html
Details: https://evuln.com/vulns/150/description.html
-----------Summary-----------
eVuln ID: EV0150
Software: Wernhart Guestbook
Vendor: Carl A. Wernhart
Version: 2001.03.28
Critical Level: low
Type: Cross Site Scripting
Status: Unpatched. No reply from developer(s)
PoC: Not available
Solution: Not available
Discovered by: Aliaksandr Hartsuyeu ( https://evuln.com/ )
--------Description--------
All user-defined parameters are not sanitized.
Arbitrary XSS is possible.
Vulnerable script: insert.phtml.
--------PoC/Exploit--------
XSS inj examples
All input data is not sanitized:
First Name: <XSS inj>
Last Name: <XSS inj>
E-Mail: <XSS inj>
Web Site: <XSS inj>
---------Solution----------
Not available
----------Credit-----------
Vulnerability discovered by Aliaksandr Hartsuyeu
https://evuln.com/xss/useragent.html - recent useragent xss vulns