tadillac100 / fuzzdb

Automatically exported from code.google.com/p/fuzzdb
0 stars 0 forks source link

opening html docs files triggers security vulnerability pop ups ( spam or feature -- maybe its intended ?? ) #5

Open GoogleCodeExporter opened 9 years ago

GoogleCodeExporter commented 9 years ago
What steps will reproduce the problem?
1. In Mozilla - open 
fuzzdb-1.09.tgz\fuzzdb-1.09\attack-payloads\sql-injection\detect\docs\docs.sql_i
njection_cheetsheet.html 

What is the expected output? What do you see instead?
Expect to a harmless document.

File has characters that cant be read. If you click through and open - you 
start getting 'security vulnerability detected'  popups.

What version of the product are you using? On what operating system?
Tarball - fuzzdb-1.09.tgz

Please provide any additional information below.
Could be something else on my machine, but just in case, submitting this

Original issue reported on code.google.com by billy.1....@gmail.com on 19 Feb 2013 at 5:08

GoogleCodeExporter commented 9 years ago
I'll handle this one.

Original comment by uni...@gmail.com on 1 Jul 2013 at 7:52

GoogleCodeExporter commented 9 years ago
I'll handle this one.

Original comment by uni...@gmail.com on 1 Jul 2013 at 7:52