Lucene search

K
exploitdbHadihadiEDB-ID:31557
HistoryMar 29, 2008 - 12:00 a.m.

Cuteflow Bin 1.5 - pages/editmailinglist_step1.php language Parameter XSS

2008-03-2900:00:00
hadihadi
www.exploit-db.com
17

0.004 Low

EPSS

Percentile

72.7%

Cuteflow Bin 1.5 pages/editmailinglist_step1.php language Parameter XSS. CVE-2008-1630. Webapps exploit for php platform

source: http://www.securityfocus.com/bid/28500/info
 
CuteFlow Bin is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied data. The issues include a SQL-injection vulnerability and multiple cross-site scripting vulnerabilities.
 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
 
These issues affect CuteFlow Bin 1.5.0; other versions may also be affected. 

http://www.example.com/[path]//pages/editmailinglist_step1.php?language=<script>alert(222)</script>

0.004 Low

EPSS

Percentile

72.7%

Related for EDB-ID:31557