lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20080822185329.31009.qmail@securityfocus.com> Date: 22 Aug 2008 18:53:29 -0000 From: hi@...com To: bugtraq@...urityfocus.com Subject: Re: RE: TimeTrex Time and Attendance Cookie Theft Even if it did work, the user would have to submit the form with the username or password fields containing the exploit code rather then enter their own information. Pretty unlikely to pull off. Regardless I talked to the developers and any potential issue will be fixed in v2.2.13 which is scheduled to be released before August 25th 2008.