|lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC
Open Source and information security mailing list archives
Date: 29 Jan 2007 20:22:43 -0000 From: brian@...rum.org To: bugtraq@...urityfocus.com Subject: Re: Phorum HTML Injection Vulnerability I have emailed this reporter about this already. Other than allowing characters such as " and >< in a user name, there is nothing vulnerable about this page. The characters are escaped properly on this page when there is an error. I have asked for more information about this issue both via email and on our own bug tracking system. I have received no reply so far. Phorum 5.1.18 did include a FIX for an XSS issue. But, it does not appear that this reporter is referring to that.
Powered by blists - more mailing lists