lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060527182326.9877.qmail@securityfocus.com> Date: 27 May 2006 18:23:26 -0000 From: jaime.blasco@...el.es To: bugtraq@...urityfocus.com Subject: D-Link DSA-3100 Cross-Site Scripting D-Link DSA-3100 Cross-Site Scripting Tested on D-Link DSA-3100 Discovered by: jaime.blasco(at)eazel(dot).es http://www.eazel.es Description: D-Link DSA-3100 Airspot Gateway is vulnerable to a security vulnerability that allow Cross-Site Scripting attacks. Due to improper filtering, a remote attacker can cause a cross site scripting in this script: http://accespoint/login_error.shtml?uname=%3CBODY%20ONLOAD=alert('www.eazel.es')%3E Original advisory: http://www.eazel.es/media/advisory003-D-Link-DSA-3100-Cross-Site-Scripting.html