LiveZilla prior to 5.1.2.1 includes the operator password in plaintext in Javascript code that is generated by lz/mobile/chat.php, which might allow remote malicious users to obtain sensitive information and gain privileges by accessing the loginName and loginPassword variables using an independent cross-site scripting (XSS) attack.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
livezilla livezilla 5.0.1.1 |
||
livezilla livezilla |
||
livezilla livezilla 5.0.1.2 |
||
livezilla livezilla 5.0.1.0 |
||
livezilla livezilla 5.1.1.0 |
||
livezilla livezilla 5.1.0.0 |
||
livezilla livezilla 5.0.1.4 |
||
livezilla livezilla 5.0.1.3 |