An issue was discovered in IT ITems DataBase (ITDB) through 1.23. The vulnerability exists due to insufficient filtration of user-supplied data in the "value" HTTP POST parameter passed to the "itdb-1.23/js/DataTables-1.8.2/examples/examples_support/editable_ajax.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/sivann/itdb/issues/56 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published: 2017-02-10T06:51:00
Updated: 2024-08-06T03:14:42.425Z
Reserved: 2017-02-09T00:00:00
Link: CVE-2016-10216

No data.

Status : Deferred
Published: 2017-02-10T07:59:00.183
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-10216

No data.