exploitdb
WRITEUP
VERIFIED
by ZoRLu · textwebappsphp
https://www.exploit-db.com/exploits/31660
The provided text describes a cross-site scripting (XSS) vulnerability in EsContacts, where user-supplied input is not properly sanitized. The example URL demonstrates how an attacker could inject arbitrary script code via the 'msg' parameter.
Classification
Writeup 90%
Target:
EsContacts (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable EsContacts application
exploitdb
WRITEUP
VERIFIED
by ZoRLu · textwebappsphp
https://www.exploit-db.com/exploits/31661
The provided text describes a cross-site scripting (XSS) vulnerability in EsContacts, where user-supplied input is not properly sanitized. The example URL demonstrates how an attacker could inject arbitrary script code via the 'msg' parameter.
Classification
Writeup 90%
Target:
EsContacts (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable EsContacts application
exploitdb
WRITEUP
VERIFIED
by ZoRLu · textwebappsphp
https://www.exploit-db.com/exploits/31662
The provided text describes a cross-site scripting (XSS) vulnerability in EsContacts, where user-supplied input is not properly sanitized. The example URL demonstrates how an attacker could inject arbitrary script code via the 'msg' parameter.
Classification
Writeup 90%
Target:
EsContacts (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable EsContacts application
exploitdb
WRITEUP
VERIFIED
by ZoRLu · textwebappsphp
https://www.exploit-db.com/exploits/31663
The provided text describes a cross-site scripting (XSS) vulnerability in EsContacts, where user-supplied input is not properly sanitized. The example URL demonstrates how an attacker could inject arbitrary script code via the 'msg' parameter in the importer.php file.
Classification
Writeup 90%
Target:
EsContacts
No auth needed
Prerequisites:
Access to the vulnerable EsContacts application
exploitdb
WRITEUP
VERIFIED
by ZoRLu · textwebappsphp
https://www.exploit-db.com/exploits/31664
The provided text describes a cross-site scripting (XSS) vulnerability in EsContacts, where the login.php page fails to sanitize user-supplied input in the 'msg' parameter. This allows attackers to execute arbitrary script code in the context of the affected site.
Classification
Writeup 90%
Target:
EsContacts (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable EsContacts login page
exploitdb
WRITEUP
VERIFIED
by ZoRLu · textwebappsphp
https://www.exploit-db.com/exploits/31665
The provided text describes a cross-site scripting (XSS) vulnerability in EsContacts, where user-supplied input is not properly sanitized in the 'msg' parameter of search.php. This allows attackers to execute arbitrary script code in the context of the affected site.
Classification
Writeup 90%
Target:
EsContacts (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable EsContacts application