exploitdb
WRITEUP
VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/32144
The provided text describes a cross-site scripting (XSS) vulnerability in MRBS 1.2.6, where user-supplied input is not properly sanitized. The example URL demonstrates how an attacker could inject arbitrary script code via the 'area' parameter in day.php.
Classification
Writeup 90%
Target:
MRBS (Meeting Room Booking Software) 1.2.6
No auth needed
Prerequisites:
Access to the vulnerable MRBS instance
exploitdb
WRITEUP
VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/32149
The provided text describes a cross-site scripting (XSS) vulnerability in MRBS 1.2.6, where user-supplied input is not properly sanitized. The example URL demonstrates how an attacker could inject arbitrary script code via the 'area' parameter in help.php.
Classification
Writeup 90%
Target:
MRBS (Meeting Room Booking Software) 1.2.6
No auth needed
Prerequisites:
Access to the target application's help.php page
exploitdb
WRITEUP
VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/32146
The provided text describes a cross-site scripting (XSS) vulnerability in MRBS 1.2.6, where user-supplied input is not properly sanitized. It includes a sample URL demonstrating the vulnerability but lacks actual exploit code.
Classification
Writeup 90%
Target:
MRBS (Meeting Room Booking Software) 1.2.6
No auth needed
Prerequisites:
Access to the vulnerable application
exploitdb
WRITEUP
VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/32148
The provided text describes a cross-site scripting (XSS) vulnerability in MRBS 1.2.6, where user-supplied input is not properly sanitized. The example URL demonstrates how an attacker could inject arbitrary script code via the 'area' parameter in report.php.
Classification
Writeup 90%
Target:
MRBS (Meeting Room Booking Software) 1.2.6
No auth needed
Prerequisites:
Access to the target application's report.php endpoint
exploitdb
WRITEUP
VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/32147
The provided text describes a cross-site scripting (XSS) vulnerability in MRBS 1.2.6, where user-supplied input is not properly sanitized. It includes a sample URL demonstrating the vulnerability but lacks executable exploit code.
Classification
Writeup 90%
Target:
MRBS (Meeting Room Booking Software) 1.2.6
No auth needed
Prerequisites:
Access to the vulnerable search.php endpoint
exploitdb
WRITEUP
VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/32145
The provided text describes a cross-site scripting (XSS) vulnerability in MRBS 1.2.6, where user-supplied input is not properly sanitized. The example URL demonstrates how an attacker could inject arbitrary script code via the 'area' parameter in week.php.
Classification
Writeup 90%
Target:
MRBS (Meeting Room Booking Software) 1.2.6
No auth needed
Prerequisites:
Access to the target application · User interaction to trigger the XSS payload