Update: 2015-01-14
5 new exploits
This commit is contained in:
parent
755f28d1d9
commit
cbc2c5d09f
6 changed files with 70 additions and 0 deletions
|
@ -32215,3 +32215,8 @@ id,file,description,date,author,platform,type,port
|
|||
35759,platforms/php/webapps/35759.txt,"eFront 3.6.9 'submitScore.php' Cross Site Scripting Vulnerability",2011-05-16,"John Leitch",php,webapps,0
|
||||
35760,platforms/php/webapps/35760.txt,"PHP Calendar Basic 2.3 Multiple Cross Site Scripting Vulnerabilities",2011-05-17,"High-Tech Bridge SA",php,webapps,0
|
||||
35761,platforms/php/webapps/35761.txt,"TWiki <= 5.0.1 'origurl' Parameter Cross Site Scripting Vulnerability",2011-05-18,"Mesut Timur",php,webapps,0
|
||||
35762,platforms/hardware/remote/35762.txt,"Cisco Unified Operations Manager <= 8.5 iptm/advancedfind.do extn Parameter XSS",2011-06-18,"Sense of Security",hardware,remote,0
|
||||
35763,platforms/hardware/remote/35763.txt,"Cisco Unified Operations Manager <= 8.5 iptm/ddv.do deviceInstanceName Parameter XSS",2011-06-18,"Sense of Security",hardware,remote,0
|
||||
35764,platforms/hardware/remote/35764.txt,"Cisco Unified Operations Manager <= 8.5 iptm/eventmon Multiple Parameter XSS",2011-06-18,"Sense of Security",hardware,remote,0
|
||||
35765,platforms/hardware/remote/35765.txt,"Cisco Unified Operations Manager <= 8.5 iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp Multiple Parameter XSS",2011-06-18,"Sense of Security",hardware,remote,0
|
||||
35766,platforms/hardware/remote/35766.txt,"Cisco Unified Operations Manager <= 8.5 iptm/logicalTopo.do Multiple Parameter XSS",2011-06-18,"Sense of Security",hardware,remote,0
|
||||
|
|
Can't render this file because it is too large.
|
11
platforms/hardware/remote/35762.txt
Executable file
11
platforms/hardware/remote/35762.txt
Executable file
|
@ -0,0 +1,11 @@
|
|||
source: http://www.securityfocus.com/bid/47901/info
|
||||
|
||||
Cisco Unified Operations Manager is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials. Other attacks may also be possible.
|
||||
|
||||
This issue is being tracked by Cisco Bug ID CSCtn61716.
|
||||
|
||||
Cisco Unified Operations Manager versions prior to 8.6 are vulnerable.
|
||||
|
||||
http://www.example.com/iptm/advancedfind.do?extn=73fcb</script><script>alert(1)</script>23fbe43447
|
14
platforms/hardware/remote/35763.txt
Executable file
14
platforms/hardware/remote/35763.txt
Executable file
|
@ -0,0 +1,14 @@
|
|||
source: http://www.securityfocus.com/bid/47901/info
|
||||
|
||||
Cisco Unified Operations Manager is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials. Other attacks may also be possible.
|
||||
|
||||
This issue is being tracked by Cisco Bug ID CSCtn61716.
|
||||
|
||||
Cisco Unified Operations Manager versions prior to 8.6 are vulnerable.
|
||||
|
||||
http://www.example.com/iptm/ddv.do?deviceInstanceName=f3806"%3balert(1)//9b92b050cf5&deviceC
|
||||
apability=deviceCap
|
||||
http://www.example.com/iptm/ddv.do?deviceInstanceName=25099<script>alert(1)</script>f813ea8c
|
||||
06d&deviceCapability=deviceCap
|
15
platforms/hardware/remote/35764.txt
Executable file
15
platforms/hardware/remote/35764.txt
Executable file
|
@ -0,0 +1,15 @@
|
|||
source: http://www.securityfocus.com/bid/47901/info
|
||||
|
||||
Cisco Unified Operations Manager is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials. Other attacks may also be possible.
|
||||
|
||||
This issue is being tracked by Cisco Bug ID CSCtn61716.
|
||||
|
||||
Cisco Unified Operations Manager versions prior to 8.6 are vulnerable.
|
||||
|
||||
http://www.example.com/iptm/eventmon?cmd=filterHelperca99b<script>alert(1)</script>542256870
|
||||
d5&viewname=device.filter&operation=getFilter&dojo.preventCache=129851
|
||||
8961028
|
||||
http://www.example.com/iptm/eventmon?cmd=getDeviceData&group=/3309d<script>alert(1)</script>
|
||||
09520eb762c&dojo.preventCache=1298518963370
|
14
platforms/hardware/remote/35765.txt
Executable file
14
platforms/hardware/remote/35765.txt
Executable file
|
@ -0,0 +1,14 @@
|
|||
source: http://www.securityfocus.com/bid/47901/info
|
||||
|
||||
Cisco Unified Operations Manager is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials. Other attacks may also be possible.
|
||||
|
||||
This issue is being tracked by Cisco Bug ID CSCtn61716.
|
||||
|
||||
Cisco Unified Operations Manager versions prior to 8.6 are vulnerable.
|
||||
|
||||
http://www.example.com/iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp?clusterName=d4f84"%3b
|
||||
alert(1)//608ddbf972
|
||||
http://www.example.com/iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp?deviceName=c25e8"%3ba
|
||||
lert(1)//79877affe89
|
11
platforms/hardware/remote/35766.txt
Executable file
11
platforms/hardware/remote/35766.txt
Executable file
|
@ -0,0 +1,11 @@
|
|||
source: http://www.securityfocus.com/bid/47901/info
|
||||
|
||||
Cisco Unified Operations Manager is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials. Other attacks may also be possible.
|
||||
|
||||
This issue is being tracked by Cisco Bug ID CSCtn61716.
|
||||
|
||||
http://www.example.com/iptm/logicalTopo.do?clusterName=&ccmName=ed1b1"%3balert(1)//cda6137ae
|
||||
4c
|
||||
http://www.example.com/iptm/logicalTopo.do?clusterName=db4c1"%3balert(1)//4031caf63d7
|
Loading…
Add table
Reference in a new issue