lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20050428165148.10489.qmail@www.securityfocus.com> Date: 28 Apr 2005 16:51:48 -0000 From: Alexander Kornbrust <ak@...-database-security.com> To: bugtraq@...urityfocus.com Subject: Cross Site Scripting in BEA Admin Console Red-Database-Security GmbH Research Advisory Name Cross Site Scripting in BEA Admin Console Systems Affected BEA Admin Console 8.1 Severity Low Risk Category Cross Site Scripting (CSS/XSS) Vendor URL http://www.bea.com Author Alexander Kornbrust (ak at red-database-security.com) Date 28 Apr 2005 (V 1.00) Advisory number AKSEC2004-042 Description ########### Cross Site Scripting in BEA Admin Console. More details available: ####################### http://www.red-database-security.com/advisory/bea_css_in_admin_console.html Patch Information ################# Apply the latest patchset from BEA. History: ######## 13 April 2004 BEA secalert was informed 13 April 2004 Bug confirmed 25 April 2005 Advisory released About Red-Database-Security GmbH ################################# Red-Database-Security GmbH is a specialist in Oracle Security. http://www.red-database-security.com