BugTraq
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
okscripts.com - XSS Vulns Jun 08 2006 09:05PM
luny youfucktard com
OkMall v1.0

Homepage:

http://www.okscripts.com/

Effected files:

search.php

XSS Vulnerabilities:

The search inputbox doesn?t properally filter using input before generating it. Backslashes areadded but we can easily

evade this.

ForPoC try putting a [imgsrc=lol.jpg]in the search ...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus