漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple cross-site scripting (XSS) vulnerabilities in Support Incident Tracker (aka SiT!) 3.65 allow remote attackers to inject arbitrary web script or HTML via (1) the file name to incident_attachments.php; (2) unspecified vectors in link_add.php, possibly involving origref, linkref, linktype parameters, which are not properly handled in the clean_int function in lib/base.inc.php, or the redirect parameter, which is not properly handled in the html_redirect function in lib/html.inc.php; and (3) unspecified vectors in translate.php.
漏洞信息
N/A
漏洞
N/A
漏洞
Support Incident Tracker多个跨站脚本漏洞
漏洞信息
Support Incident Tracker (or SiT!)是一个基于Web技术支持电话或电子邮件的追踪应用程序。 Support Incident Tracker (也称 SiT!) 3.65版本中存在多个跨站脚本漏洞(XSS)。远程攻击者可利用这些漏洞借助(1)incident_attachments.php的文件名(2)link_add.php中的未明向量,可能涉及lib/base.inc.php的clean_int函数中未经正确处理的origref, linkref, linktype参数
漏洞信息
N/A
漏洞
N/A