exploitdb
WRITEUP
VERIFIED
by anonymous · textwebappsjsp
https://www.exploit-db.com/exploits/36353
The provided text describes a cross-site scripting (XSS) vulnerability in HP Network Node Manager i, where user-supplied input is not properly sanitized. The example URL demonstrates how an attacker could inject arbitrary script code into the 'node' parameter.
Classification
Writeup 90%
Target:
HP Network Node Manager i
No auth needed
Prerequisites:
Access to the vulnerable application · Ability to craft a malicious URL
exploitdb
WRITEUP
VERIFIED
by anonymous · textwebappsjsp
https://www.exploit-db.com/exploits/36354
The provided text describes a cross-site scripting (XSS) vulnerability in HP Network Node Manager i, where user-supplied input is not properly sanitized. The example URL demonstrates how an attacker could inject arbitrary script code into the 'nodename' parameter.
Classification
Writeup 90%
Target:
HP Network Node Manager i
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WRITEUP
VERIFIED
by anonymous · textwebappsjsp
https://www.exploit-db.com/exploits/36355
The provided text describes a cross-site scripting (XSS) vulnerability in HP Network Node Manager i, where user-supplied input is not properly sanitized. The example URL demonstrates how an attacker could inject arbitrary script code via the 'nodename' parameter.
Classification
Writeup 90%
Target:
HP Network Node Manager i
No auth needed
Prerequisites:
Access to the vulnerable application · Ability to craft a malicious URL
exploitdb
WRITEUP
VERIFIED
by anonymous · textwebappsjsp
https://www.exploit-db.com/exploits/36356
The provided text describes a cross-site scripting (XSS) vulnerability in HP Network Node Manager i, where user-supplied input is not properly sanitized. The example URL demonstrates how an attacker could inject arbitrary script code into the 'nodename' parameter.
Classification
Writeup 90%
Target:
HP Network Node Manager i
No auth needed
Prerequisites:
Access to the vulnerable application URL
exploitdb
WRITEUP
VERIFIED
by anonymous · textwebappsjsp
https://www.exploit-db.com/exploits/36357
The provided text describes a cross-site scripting (XSS) vulnerability in HP Network Node Manager i, where user-supplied input is not properly sanitized. The example URL demonstrates how an attacker could inject arbitrary script code into the 'nodename' parameter.
Classification
Writeup 90%
Target:
HP Network Node Manager i
No auth needed
Prerequisites:
Access to the vulnerable web interface