Verylost LostBook消息项目HTML注入漏洞

漏洞信息详情

Verylost LostBook消息项目HTML注入漏洞

漏洞简介

lostBook 1.1以及之前的版本存在跨站脚本攻击(XSS)漏洞。远程攻击者借助(1) Email或(2) Website字段注入任意web脚本。

漏洞公告

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: XF
名称: lostbook-email-website-xss(16835)
链接:http://xforce.iss.net/xforce/xfdb/16835

来源: BID
名称: 10825
链接:http://www.securityfocus.com/bid/10825

来源: OSVDB
名称: 8271
链接:http://www.osvdb.org/8271

来源: SECTRACK
名称: 1010812
链接:http://securitytracker.com/id?1010812

来源: SECUNIA
名称: 12190
链接:http://secunia.com/advisories/12190

来源: BUGTRAQ
名称: 20040729 lostBook v1.1 Javascript Execution
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=109112282611808&w=2

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享