lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070120220927.5265.qmail@securityfocus.com> Date: 20 Jan 2007 22:09:27 -0000 From: Advisory@...a-security.net To: bugtraq@...urityfocus.com Subject: XMB "U2U Instant Messenger" Cross-Site Scripting #Aria-Security Team #http://Aria-Security.com #Contact: Advisory@...a-security.com #Type:Remote Cross-Site Scripting #Article on XSS: http://aria-security.net/xss.rar #Discovered By Aria-Security Team #Software: XMB U2u Instant Messenger # #Explanation: First of all user must be REGISTERED - Go to http://target/xmbpath/memcp.php ---> U2U Instant Messenger - Inster your xss code for the recipient - Press Preview Original Advisory http://aria-security.com/forum/showthread.php?p=129