exploit-db-mirror/exploits/windows/remote/21446.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

9 lines
No EOL
611 B
Text

source: https://www.securityfocus.com/bid/4720/info
SGDynamo is a web application engine for Microsoft Windows operating systems.
Script code is not filtered from URL parameters that are used as output by the SGDynamo program. This may enable an attacker to inject script code into a malicious link to the program. The script code will be executed in the browser of a user who visits the link, in the context of the site running the program.
This may enable the attacker to steal cookie-based authentication credentials from legitimate users.
http://target/sgdynamo.exe?HTNAME=<script>alert("test")</script>