lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20050520022526.26904.qmail@www.securityfocus.com> Date: 20 May 2005 02:25:26 -0000 From: farhad koosha <farhadkey@...oo.com> To: bugtraq@...urityfocus.com Subject: episodex guestbook security bypass & html injection Vendor URL : http://www.episodex.de HTML Injection : "Name" & other fields in "default.asp" are not validated. Script code will be executed in the user's browser session, when the entry is viewed. Security Bypass : It is possible to edit settings without authentication by accessing the scripts "admin.asp" http://www.bahadorlover.com 3nitroToloen (!)