XSS in Agora-Project 3.2.2 exists with an index.php?ctrl=file&targetObjId=fileFolder-2&targetObjIdChild=[XSS] attack.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/96940 | vdb entry third party advisory |
https://packetstormsecurity.com/files/141507/Agora-Project-3.2.2-Cross-Site-Scripting.html | exploit vdb entry third party advisory |