What steps will reproduce the problem?
1. In Mozilla - open
fuzzdb-1.09.tgz\fuzzdb-1.09\attack-payloads\sql-injection\detect\docs\docs.sql_i
njection_cheetsheet.html
What is the expected output? What do you see instead?
Expect to a harmless document.
File has characters that cant be read. If you click through and open - you
start getting 'security vulnerability detected' popups.
What version of the product are you using? On what operating system?
Tarball - fuzzdb-1.09.tgz
Please provide any additional information below.
Could be something else on my machine, but just in case, submitting this
Original issue reported on code.google.com by billy.1....@gmail.com on 19 Feb 2013 at 5:08
Original issue reported on code.google.com by
billy.1....@gmail.com
on 19 Feb 2013 at 5:08