Btiteam

Xbtit

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.31%
  • Veröffentlicht 16.03.2022 16:15:10
  • Zuletzt bearbeitet 21.11.2024 06:33:06

A cross-site scripting vulnerability is present in Xbtit 3.1. The stored XSS vulnerability occurs because /ajaxchat/sendChatData.php does not properly validate the value of the "n" (POST) parameter. Through this vulnerability, an attacker is capable ...

Exploit
  • EPSS 1.86%
  • Veröffentlicht 16.03.2022 15:15:16
  • Zuletzt bearbeitet 21.11.2024 06:33:06

A blind SQL injection vulnerability exists in Xbtit 3.1 via the sid parameter in ajaxchat/getHistoryChatData.php file that is accessible by a registered user. As a result, a malicious user can extract sensitive data such as usernames and passwords an...

  • EPSS 0.2%
  • Veröffentlicht 01.10.2018 23:29:01
  • Zuletzt bearbeitet 21.11.2024 03:55:05

An issue was discovered in BTITeam XBTIT 2.5.4. The "returnto" parameter of account_change.php is vulnerable to an open redirect, a different vulnerability than CVE-2018-15683.

Exploit
  • EPSS 0.24%
  • Veröffentlicht 05.09.2018 21:29:03
  • Zuletzt bearbeitet 21.11.2024 03:52:36

An issue was discovered in BTITeam XBTIT 2.5.4. news.php allows XSS via the id parameter.

Exploit
  • EPSS 0.25%
  • Veröffentlicht 05.09.2018 21:29:02
  • Zuletzt bearbeitet 21.11.2024 03:51:16

An issue was discovered in BTITeam XBTIT. PHP error logs are stored in an open directory (/include/logs) using predictable file names, which can lead to full path disclosure and leakage of sensitive data.

Exploit
  • EPSS 0.17%
  • Veröffentlicht 05.09.2018 21:29:01
  • Zuletzt bearbeitet 21.11.2024 03:51:15

An issue was discovered in BTITeam XBTIT. By using String.replace and eval, it is possible to bypass the includes/crk_protection.php anti-XSS mechanism that looks for a number of dangerous fingerprints.

Exploit
  • EPSS 0.15%
  • Veröffentlicht 05.09.2018 21:29:01
  • Zuletzt bearbeitet 21.11.2024 03:51:15

The newsfeed (aka /index.php?page=viewnews) in BTITeam XBTIT 2.5.4 has stored XSS via the title of a news item. This is also exploitable via CSRF.

Exploit
  • EPSS 0.24%
  • Veröffentlicht 05.09.2018 21:29:01
  • Zuletzt bearbeitet 21.11.2024 03:51:15

An issue was discovered in BTITeam XBTIT 2.5.4. The "act" parameter in the sign-up page available at /index.php?page=signup is vulnerable to reflected cross-site scripting.

Exploit
  • EPSS 0.24%
  • Veröffentlicht 05.09.2018 21:29:01
  • Zuletzt bearbeitet 21.11.2024 03:51:15

An issue was discovered in BTITeam XBTIT 2.5.4. The "keywords" parameter in the search function available at /index.php?page=forums&action=search is vulnerable to reflected cross-site scripting.

Exploit
  • EPSS 0.17%
  • Veröffentlicht 05.09.2018 21:29:01
  • Zuletzt bearbeitet 21.11.2024 03:51:15

An issue was discovered in BTITeam XBTIT 2.5.4. The hashed passwords stored in the xbtit_users table are stored as unsalted MD5 hashes, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack.