Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.15785 |
Categoría: | Web application abuses |
Título: | Aztek Forum XSS |
Resumen: | The remote web server contains a PHP script which is vulnerable to a cross; site scripting issue;; Description :;; The remote host is using Aztek Forum, a web forum written in PHP.;; A vulnerability exists the remote version of this software - more; specifically in the script 'forum_2.php', which may allow an attacker to; set up a cross site scripting attack using the remote host. |
Descripción: | Summary: The remote web server contains a PHP script which is vulnerable to a cross site scripting issue Description : The remote host is using Aztek Forum, a web forum written in PHP. A vulnerability exists the remote version of this software - more specifically in the script 'forum_2.php', which may allow an attacker to set up a cross site scripting attack using the remote host. Solution: Upgrade to the latest version of this software CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N |
Referencia Cruzada: |
BugTraq ID: 11654 Common Vulnerability Exposure (CVE) ID: CVE-2004-2725 http://www.securityfocus.com/bid/11654 http://www.osvdb.org/11704 http://www.osvdb.org/11705 http://www.osvdb.org/11706 http://securitytracker.com/id?1012213 http://secunia.com/advisories/13202 XForce ISS Database: aztek-forum-xss(18057) https://exchange.xforce.ibmcloud.com/vulnerabilities/18057 |
Copyright | Copyright (C) 2004 David Maciejak |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |