BugTraq
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
DataWatch Monarch Business Intelligence (BI) v5.1 Admin Section Blind XPath Injection Jul 30 2012 02:40PM
vulns dionach com
DataWatch Monarch BI v5.1 admin section blind XPath injection

Class: Input Validation Error
Remote: Yes
Local: No
Published: 26/06/2012
Credit: Raymond Rizk of Dionach Limited (vulns (at) dionach (dot) com [email concealed])

Vulnerable: DataWatch Monarch BI v5.1

DataWatch's Monarch BI admin section is prone to a blind XP...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus