"value":"Multiple cross-site scripting (XSS) vulnerabilities in TorrentTrader Classic 1.09 allow remote authenticated users to inject arbitrary web script or HTML via (1) the Title field to requests.php, related to viewrequests.php; and (2) the Torrent Name field to torrents-upload.php, related to the logging of torrent uploads; and allow remote attackers to inject arbitrary web script or HTML via (3) the ttversion parameter to themes/default/footer.php, the (4) SITENAME and (5) CURUSER[username] parameters to themes/default/header.php, (6) the todayactive parameter to visitorstoday.php, (7) the activepeople parameter to visitorsnow.php, (8) the faq_categ[999][title] parameter to faq.php, and (9) the keepget parameter to torrents-details.php."
},
{
"lang":"es",
"value":"M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en TorrentTrader Classic v1.09 permiten a usuarios remotos inyectar codigo web script o c\u00f3digo HTML a trav\u00e9s de (1) el campo Title de requests.php (relacionado con viewrequests.php), (2) el campo \"Torrent Name\" (nombre del torrent) de torrents-upload.php (relacionado con el registro de las subidas de torrents), (3) el par\u00e1metro ttversion de themes/default/footer.php, (4) los par\u00e1metros SITENAME y (5) CURUSER[username] de themes/default/header.php, (6) el par\u00e1metro todayactive de visitorstoday.php, (7) el par\u00e1metro activepeople de visitorsnow.php, (8) el par\u00e1metro faq_categ[999][title] de faq.php, y el par\u00e1metro (9) keepget de torrents-details.php."