[Owasp-leaders] Mailman script insertion vulnerabilities

Chris Schmidt chris.schmidt at owasp.org
Thu Feb 24 10:19:24 EST 2011


O Hai! Thx for lulz!


On 2/24/11 3:12 AM, "gaz Heyes" <gazheyes at gmail.com> wrote:

> On 24 February 2011 10:04, Magno Logan <magno.logan at owasp.org> wrote:
>> The funny thing is that right under the article at Help Net Security they
>> have an ad asking you to subscribe to their newsletter, and the newsletter
>> uses Mailman version 2.1.14 (exactly the one that is vulnerable).
> 
> LOL :) 
> 
> 
> _______________________________________________
> OWASP-Leaders mailing list
> OWASP-Leaders at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-leaders

Chris Schmidt
ESAPI Project Manager (http://www.esapi.org)
ESAPI4JS Project Owner (http://bit.ly/9hRTLH)
Blog: http://yet-another-dev.blogspot.com


-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.owasp.org/pipermail/owasp-leaders/attachments/20110224/7b43f48a/attachment.html 


More information about the OWASP-Leaders mailing list