Page 3 of 12 results (0.004 seconds)

CVSS: 6.0EPSS: 0%CPEs: 1EXPL: 9

Multiple cross-site scripting (XSS) vulnerabilities in JBMC Software DirectAdmin 1.28.1 allow remote authenticated users to inject arbitrary web script or HTML via the (1) user parameter to (a) CMD_SHOW_RESELLER or (b) CMD_SHOW_USER in the Admin level; the (2) TYPE parameter to (c) CMD_TICKET_CREATE or (d) CMD_TICKET, the (3) user parameter to (e) CMD_EMAIL_FORWARDER_MODIFY, (f) CMD_EMAIL_VACATION_MODIFY, or (g) CMD_FTP_SHOW, and the (4) name parameter to (h) CMD_EMAIL_LIST in the User level; or the (5) user parameter to (i) CMD_SHOW_USER in the Reseller level. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en JBMC Software DirectAdmin 1.28.1 permiten a usuarios remotos autenticados inyectar secuencias de comandos web o HTML de su elección a través del parámetro (1) usuario (user) de (a) CMD_SHOW_RESELLER o (b) CMD_SHOW_USER en el nivel de administrador (Admin level); el parámetro (2) TYPE de (c) CMD_TICKET_CREATE o (d) CMD_TICKET, el parámetro (3) usuario (user) de (e) CMD_EMAIL_FORWARDER_MODIFY, (g) CMD_EMAIL_VACATION_MODIFY, o (g) CMD_FTP_SHOW, y el parámetro (4) nombre (name) de (h) CMD_EMAIL_LIST en el nivel de usuario (User level); o el parámetro (5) usuario (user) de (i) CMD_SHOW_USER en el nivel de revendedor (Reseller level). • https://www.exploit-db.com/exploits/29002 https://www.exploit-db.com/exploits/29005 https://www.exploit-db.com/exploits/29004 https://www.exploit-db.com/exploits/29006 https://www.exploit-db.com/exploits/28999 https://www.exploit-db.com/exploits/29000 https://www.exploit-db.com/exploits/29003 https://www.exploit-db.com/exploits/29001 http://aria-security.net/advisory/directadmin.txt http://securityreason.com/securityalert/1885 http://www.securityfocus.com/archive/1/4 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in HTM_PASSWD in DirectAdmin Hosting Management allows remote attackers to inject arbitrary web script or HTML via the domain parameter. • http://secunia.com/advisories/19885 http://securityreason.com/securityalert/830 http://www.aria-security.net/advisory/hm/directadmin.txt http://www.securityfocus.com/archive/1/432459/100/0/threaded http://www.vupen.com/english/advisories/2006/1576 •