Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.801808
Categoría:Web application abuses
Título:SurgeMail SurgeWeb Cross Site Scripting Vulnerability
Resumen:The host is running SurgeMail and is prone to Cross site scripting; vulnerability.
Descripción:Summary:
The host is running SurgeMail and is prone to Cross site scripting
vulnerability.

Vulnerability Insight:
The flaw is caused by improper validation of user-supplied input via the
'username_ex' parameter to the SurgeWeb interface '/surgeweb', which allows
the attackers to execute arbitrary HTML and script code in a user's browser
session in the context of an affected site.

Vulnerability Impact:
Successful exploitation will allow attacker to insert arbitrary HTML and
script code, which will be executed in a user's browser session in the context of an affected site.

Affected Software/OS:
NetWin Surgemail versions before 4.3g.

Solution:
Upgrade to NetWin Surgemail version 4.3g or later.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N

Referencia Cruzada: BugTraq ID: 43679
Common Vulnerability Exposure (CVE) ID: CVE-2010-3201
http://www.securityfocus.com/bid/43679
Bugtraq: 20101004 NetWin Surgemail XSS vulnerability (Google Search)
http://www.securityfocus.com/archive/1/514115/100/0/threaded
https://www.exploit-db.com/exploits/34797/
http://ictsec.se/?p=108
http://secunia.com/advisories/41685
CopyrightCopyright (C) 2011 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.