Updated 09_01_2014
This commit is contained in:
parent
6460eb14e7
commit
e410e91c29
4 changed files with 29 additions and 0 deletions
|
@ -31061,3 +31061,6 @@ id,file,description,date,author,platform,type,port
|
|||
34482,platforms/php/webapps/34482.txt,"TurnkeyForms Yahoo Answers Clone 'questiondetail.php' Cross Site Scripting Vulnerability",2009-08-10,Moudi,php,webapps,0
|
||||
34483,platforms/php/webapps/34483.txt,"Nasim Guest Book 'page' Parameter Cross Site Scripting Vulnerability",2010-08-10,Moudi,php,webapps,0
|
||||
34484,platforms/php/webapps/34484.txt,"Joomla! 'com_dirfrm' Component Multiple SQL Injection Vulnerabilities",2010-08-18,Hieuneo,php,webapps,0
|
||||
34485,platforms/php/webapps/34485.txt,"FreeSchool 'key_words' Parameter Cross Site Scripting Vulnerability",2009-10-14,"drunken danish rednecks",php,webapps,0
|
||||
34486,platforms/php/webapps/34486.txt,"PHPCMS2008 'download.php' Information Disclosure Vulnerability",2009-10-19,Securitylab.ir,php,webapps,0
|
||||
34487,platforms/php/webapps/34487.txt,"Facil Helpdesk kbase/kbase.php URI XSS",2009-08-07,Moudi,php,webapps,0
|
||||
|
|
Can't render this file because it is too large.
|
10
platforms/php/webapps/34485.txt
Executable file
10
platforms/php/webapps/34485.txt
Executable file
|
@ -0,0 +1,10 @@
|
|||
source: http://www.securityfocus.com/bid/42513/info
|
||||
|
||||
FreeSchool is prone to a cross-site scripting vulnerability because the application fails to sufficiently sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
|
||||
|
||||
FreeSchool 1.1.0 is vulnerable; others may also be affected.
|
||||
|
||||
|
||||
http://www.example.com/biblioteca/index.php?action=bib_searchs&method=searchs&key_words=example%22%27%3E%3Cscript%3Ealert(1)%3C/script%3E
|
7
platforms/php/webapps/34486.txt
Executable file
7
platforms/php/webapps/34486.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/42514/info
|
||||
|
||||
PHPCMS2008 is prone to an information-disclosure vulnerability because it fails to sufficiently validate user-supplied data.
|
||||
|
||||
An attacker can exploit this issue to download local files in the context of the webserver process. This may allow the attacker to obtain sensitive information; other attacks are also possible.
|
||||
|
||||
http://www.example.com/download.php?a_k=Jh5zIw==&i=20&m=2&f=../include/config.inc.php&t=2233577313&ip=127.0.0.1&s=m/&d=1
|
9
platforms/php/webapps/34487.txt
Executable file
9
platforms/php/webapps/34487.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/42528/info
|
||||
|
||||
Facil Helpdesk is prone to multiple input-validation vulnerabilities, including a cross-site scripting vulnerability, a local file-include vulnerability, and a remote file-include vulnerability.
|
||||
|
||||
An attacker can exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, obtain potentially sensitive information, execute local script code in the context of the application, or to execute arbitrary code within the context of the webserver process; other attacks are also possible.
|
||||
|
||||
Facil Helpdesk 2.3 Lite is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/kbase/kbase.php/"><script>alert(document.cookie);</script>
|
Loading…
Add table
Reference in a new issue