diff --git a/platforms/asp/webapps/15653.txt b/platforms/asp/webapps/15653.txt index e7545dcb6..a8fcd1494 100755 --- a/platforms/asp/webapps/15653.txt +++ b/platforms/asp/webapps/15653.txt @@ -34,9 +34,9 @@ scripting and SQL-injection vulnerabilities were found in the following files of the BugTracker.NET: . *bugs.aspx*. SQL injection in line 141. - . *delete_query.aspx*. No sanitization for \'row_id.Value\' in line 30. + . *delete_query.aspx*. No sanitization for 'row_id.Value' in line 30. . *edit_bug.aspx*. Variables without sanitization in lines 1846 and 1857. - . *edit_bug.aspx*. No sanitization for variable \'new_project\', line 2214. + . *edit_bug.aspx*. No sanitization for variable 'new_project', line 2214. . *edit_bug.aspx*. XSS in line 2918. . *edit_comment.aspx*. XSS in line 233. . *edit_customfield.aspx*. Lines 165 and 172, no sanitization. @@ -68,7 +68,7 @@ and Alejandro Frydman from Core Security Technologies. [CVE-2010-3266 | N/A]. All XSS vulnerabilities can be exploited in similar ways. The following proof of concept shows how to exploit the -XSS founded in \'edit_comment.aspx\': +XSS founded in 'edit_comment.aspx': /----- ... @@ -76,9 +76,9 @@ XSS founded in \'edit_comment.aspx\': 231
232 233 >back to <% -Response.Write(btnet.Util.get_setting(\"SingularBugLabel\",\"bug\")); %> -234 |