AzDGDatingLite跨站脚本漏洞

漏洞信息详情

AzDGDatingLite跨站脚本漏洞

漏洞简介

AzDGDatingLite 2.1.1版本存在跨站脚本漏洞。远程攻击者借助(1)index.php的l参数(又称为语言变量)或者(2)view.php的id参数,注入任意web脚本或者HTML。

漏洞公告

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: XF
名称: azdgdating-index-view-xss(15796)
链接:http://xforce.iss.net/xforce/xfdb/15796

来源: BID
名称: 10084
链接:http://www.securityfocus.com/bid/10084

来源: OSVDB
名称: 5019
链接:http://www.osvdb.org/5019

来源: OSVDB
名称: 5018
链接:http://www.osvdb.org/5018

来源: SECUNIA
名称: 11326
链接:http://secunia.com/advisories/11326

来源: BUGTRAQ
名称: 20040408 [waraxe-2004-SA#014 – Cross-Site Scripting aka XSS in AzDGDatingLite]
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=108144342317973&w=2

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享