We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hello,
While testing the Netsparker web application security scanner we identified a vulnerability in Sharre (2.0.1).
Can you please advise whom shall we contact to disclose the vulnerability details so it can be fixed?
Please email me: daniel (at) netsparker (dot) com
Looking forward to hearing from you.
Regards,
Daniel Bishtawi
The text was updated successfully, but these errors were encountered:
We are patching the script ourselves so it sanitizes script tags passed in via the URL. Is that the issue?
Sorry, something went wrong.
Hi @DanielBishtawi. Did you receive any reply?
@makmour We received a reply by the vendor stopped responding.
The technical details can be found here: https://www.netsparker.com/web-applications-advisories/ns-18-041-dom-cross-site-scripting-in-sharrre/
Thanks for your fast reply @DanielBishtawi.
No branches or pull requests
Hello,
While testing the Netsparker web application security scanner we identified a vulnerability in Sharre (2.0.1).
Can you please advise whom shall we contact to disclose the vulnerability details so it can be fixed?
Please email me: daniel (at) netsparker (dot) com
Looking forward to hearing from you.
Regards,
Daniel Bishtawi
The text was updated successfully, but these errors were encountered: