10 lines
No EOL
607 B
Text
Executable file
10 lines
No EOL
607 B
Text
Executable file
source: http://www.securityfocus.com/bid/21737/info
|
|
|
|
PHP Live! is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input.
|
|
|
|
An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
|
|
|
|
Version 3.2.2 was reported vulnerable; other versions may also be affected.
|
|
|
|
/phplive/message_box.php?theme=&l=ezpub&x=1&deptid=[XSS]
|
|
/phplive/message_box.php?theme=&l=admin&x=[XSS] |