On Dec 24, 2007 3:53 PM, coderman <[EMAIL PROTECTED]> wrote:
> i am looking for details of the PKI for integration of webwasher ssl
> scanner into an organization.
thanks to those who responded. in the interest of propagating useful
information:
the structure of PKI implemented in an organizatio
i am looking for details of the PKI for integration of webwasher ssl
scanner into an organization. they do not appear forthcoming with
details...
does the organization's root CA certify the appliance as a CA (so it
can sign the MitM certs?)
does the organization's CA have to sign each MitM cert
I know these XSS vulns are kind of easy to find and they usually come off as
"so easy a monkey could do it", but i thought i'd throw this one out
there...
http://track.dhl-usa.com//atrknav.asp?shipmentNumber=
alert('test')
sincerely,
a monkey.
___
Full-
###
Luigi Auriemma
Application: VideoLAN (VLC)
http://www.videolan.org
Versions: <= 0.8.6d
Platforms:Windows, Mac, *BSD, *nix and more
Bugs: A] buffer-overflow in the h
###
Luigi Auriemma
Application: Ada Image server (ImgSvr)
http://adaimgsvr.sourceforge.net
Versions: <= 0.6.21 and SVN <= 28
Platforms:Windows and *nix
Bug: directory
###
Luigi Auriemma
Application: Zoom Player
http://www.inmatrix.com
Versions: <= v6.00 beta 2 and naturally all the stable v5 versions
Platforms:Windows
Bug: unicode b
The InstallShield Update Service Web Agent version 5.1.100.47363 suffers from an
exploitable buffer overflow in the ProductCode parameter of the
DownloadAndExecute()
function. This object is marked safe for scripting. Note that this issue
appears to different
from http://www.securityfocus.com/bid