漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Stored cross site scripting
Vulnerability Description
Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The "File Name" page (/cgi/uset.cgi?-cfilename) in the User Settings menu improperly filters the "file name" and wildcard character input field. By exploiting the wildcard character feature, attackers are able to store arbitrary Javascript code which is being triggered if the page is viewed afterwards, e.g. by higher privileged users such as admins. This attack can even be performed without being logged in because the affected functions are not fully protected. Without logging in, only the file name parameter of the "Default" User can be changed.
CVSS Information
N/A
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Image Access Scan2Net 安全漏洞
Vulnerability Description
Image Access Scan2Net是德国Image Access公司的一款扫描软件。 Image Access Scan2Net 7.40及之前版本、7.42及之前版本和7.42B之前版本存在安全漏洞,该漏洞源于输入清理不当,攻击者可以执行跨站脚本攻击,并在其他用户的浏览器中运行任意Javascript。
CVSS Information
N/A
Vulnerability Type
N/A