漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple cross-site scripting (XSS) vulnerabilities in Vikingboard 0.1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) id, (2) f, (3) quote, and (4) act parameters to cp.php; the (5) u parameter to user.php; the (6) f parameter to post.php; the (7) s parameter to topic.php; the (8) quote, (9) t, (10) poll, and (11) p parameters to post.php; the (12) Message Title field of a private message (PM) in mode 6 of cp.php; the (13) title field of a private message (PM) in mode 7 of cp.php; and (14) allow user-assisted remote attackers to inject arbitrary web script or HTML via a dosearch action to search.php, which reflects the first lines of all posts by a user. NOTE: the act parameter to help.php and the p parameter to report.php are already covered by CVE-2006-4708. NOTE: vectors 12 and 13 might overlap CVE-2006-6283.1. NOTE: vector 14 might overlap CVE-2006-4708.b.
漏洞信息
N/A
漏洞
N/A
漏洞
Vikingboard 多个跨站脚本攻击漏洞
漏洞信息
Vikingboard 0.1.2版本中存在多个跨站脚本攻击漏洞。远程攻击者可以借助(1) id, (2) f, (3) quote, 和 (4)对cp.php的act参数; (5)对user.php的u参数;(6)对post.php的f参数;(7)对topic.php的s参数;(8) quote, (9) t, (10) poll, 和 (11)对post.php的p参数;(12)cp.php的模式6 ; (13)cp.php的模式7中的私密信息的信息标题字段,注入任意web脚本或HTML; 以及(14
漏洞信息
N/A
漏洞
N/A