漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple cross-site scripting (XSS) vulnerabilities in V3 Chat allow remote attackers to inject arbitrary web script or HTML via crafted HTML tags, as demonstrated by the IMG tag, in the (1) id parameter in (a) mail/index.php and (b) mail/reply.php; (2) login_id parameter in (c) members/is_online.php; (3) site_id parameter in (d) messenger/online.php, (e) messenger/search.php, and (f) messenger/profile.php; (4) contact_name parameter in messenger/search.php; (5) membername parameter in (g) messenger/profileview.php; (6) unspecified parameters used when "editing a profile"; and (7) cust_name parameter in (h) messenger/expire.php. NOTE: The vendor disputes the vectors involving files in the messenger directory, stating "... the referenced folder 'messenger' was never available to the general public...".
漏洞信息
N/A
漏洞
N/A
漏洞
V3 Chat Instant Messenger多个跨站脚本攻击漏洞
漏洞信息
V3 Chat中存在多个跨站脚本攻击(XSS) 漏洞。远程攻击者可以借助特制的HTML标签,注入任意web脚本或HTML。 比如(1)(a) mail/index.php和(b) mail/reply.php中的id参数; (2)(c) members/is_online.php中的login_id参数; (3) (d) messenger/online.php, (e) messenger/search.php,和(f) messenger/profile.php中的site_id参数; (4)mess
漏洞信息
N/A
漏洞
N/A