diff --git a/files.csv b/files.csv index 8fd1577ed..cf6aef787 100755 --- a/files.csv +++ b/files.csv @@ -33513,3 +33513,5 @@ id,file,description,date,author,platform,type,port 37131,platforms/php/webapps/37131.txt,"MySQLDumper 1.24.4 main.php Multiple Function CSRF",2012-04-27,AkaStep,php,webapps,0 37132,platforms/php/webapps/37132.txt,"WordPress Plugin Free Counter 1.1 Stored XSS",2015-05-27,"Panagiotis Vagenas",php,webapps,80 37133,platforms/php/webapps/37133.txt,"MySQLDumper 1.24.4 index.php page Parameter XSS",2012-04-27,AkaStep,php,webapps,0 +37134,platforms/php/webapps/37134.php,"MySQLDumper 1.24.4 'menu.php' Remote PHP Code Execution Vulnerability",2012-04-27,AkaStep,php,webapps,0 +37135,platforms/hardware/webapps/37135.txt,"iGuard Security Access Control Device Firmware 3.6.7427A Cross Site Scripting Vulnerability",2012-05-02,"Usman Saeed",hardware,webapps,0 diff --git a/platforms/hardware/webapps/37135.txt b/platforms/hardware/webapps/37135.txt new file mode 100755 index 000000000..47526d002 --- /dev/null +++ b/platforms/hardware/webapps/37135.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/53355/info + +iGuard Security Access Control is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input in the embedded web server. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. + +http://www.example.com/>