«
Expand/Collapse
59 items tagged "form"
Related tags:
wordpress [+],
contact [+],
txt [+],
tomcat [+],
hacks [+],
authentication [+],
apache tomcat [+],
video [+],
security [+],
vmware [+],
server password [+],
server [+],
obfuscation [+],
net [+],
form generator [+],
day [+],
authenticator [+],
appending [+],
apache [+],
vacuum [+],
tool [+],
sql injection [+],
shell [+],
printer [+],
phpbazar [+],
mail form [+],
mail [+],
information disclosure vulnerability [+],
home [+],
cross site scripting [+],
vulnerability [+],
zingiri [+],
webapps [+],
web applications [+],
vulnerabilities [+],
vacuum table [+],
user [+],
usb rs232 adapter [+],
usb rs [+],
url [+],
unlimited [+],
tomatocart [+],
table [+],
survey creator [+],
sql [+],
spurned [+],
spray foam [+],
small form factor pc [+],
security researchers [+],
science fiction author [+],
safer use [+],
robots [+],
resin [+],
replacement [+],
recreating [+],
radiation detector [+],
prints [+],
power button [+],
plugin [+],
pkd [+],
piwik [+],
pip boy [+],
pip [+],
php form [+],
phillip k. dick [+],
phillip k dick [+],
pegboard [+],
parts [+],
opera [+],
nick skvarla [+],
microtower [+],
maker [+],
james [+],
ideo [+],
hubub [+],
heating coils [+],
hack [+],
gps sensor [+],
gift [+],
function [+],
ftdi [+],
form php [+],
footprint [+],
factor [+],
example [+],
entertainment [+],
electric frying pans [+],
dumpster diving [+],
digital [+],
daniel [+],
computer speaker [+],
broadcom [+],
audio [+],
android [+],
ajax [+],
Fixes [+],
php [+],
web [+],
service vulnerability [+],
hash collision [+],
denial of service [+]
-
-
16:00
»
SecuriTeam
The Zingiri Form Builder plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
-
-
19:00
»
Packet Storm Security Advisories
When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending "/j_security_check" to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to FormAuthenticator#authenticate(). Tomcat versions 6.0.0 through 6.0.35 and 7.0.0 through 7.0.27 are affected.
-
19:00
»
Packet Storm Security Recent Files
When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending "/j_security_check" to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to FormAuthenticator#authenticate(). Tomcat versions 6.0.0 through 6.0.35 and 7.0.0 through 7.0.27 are affected.
-
19:00
»
Packet Storm Security Misc. Files
When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending "/j_security_check" to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to FormAuthenticator#authenticate(). Tomcat versions 6.0.0 through 6.0.35 and 7.0.0 through 7.0.27 are affected.
-
-
4:06
»
Hack a Day
The Form 1 resin printer Kickstarter met its funding goal in just about 8 hours, and after five days is on track to be the most successful Kickstarter to date. Being so successful meant we had to drop by the FormLabs booth at Maker Faire to see what the hubub is. From the sample prints [...]
-
-
10:01
»
Hack a Day
Yes, that’s an android of [Phillip K. Dick]. While you don’t necessarily need to be familir with [Phillip K. Dick] to find this story amusing, we highly recommend that you take a few minutes to learn about him if you don’t recognize the name. [Phillip K. Dick], or [PKD] was a science fiction author and [...]
-
-
14:03
»
Hack a Day
[Daniel] wrote in to tell us about his PIP-Boy 2000 prototype. While most PIP-Boy remakes we’ve seen tend to be focusing more on the aesthetic side, like a prop, [Daniel] is attempting to make a functional one. He has included a GPS sensor, RFID reader, and radiation detector in his build but did choose [...]
-
-
8:01
»
Hack a Day
[form], a new user on the Hack a Day forums, was thinking, “what Christmas present i can send a friend, that would be really annoying?” We think he really hit it out of the park with this one. It’s a modified computer speaker that will play “explicit” audio until the power button is pressed 200 [...]
-
-
14:01
»
Hack a Day
[James] builds all sorts of robots and superhero costume replicas at home, so he is always searching for a better way to get consistent results when using his vacuum table. A lot of people use their oven or exposed heating coils from electric frying pans to warm the plastic sheets, but [James] wasn’t really interested in going [...]
-
-
22:04
»
Packet Storm Security Advisories
VMware vFabric tc Server allows users to store the passwords used for JMX authentication in an obfuscated form for organizations where storing passwords in plain text is not permitted. The JMX authentication implementation was incorrectly allowing users to authenticate using the password in either its plain text form or its obfuscated form, bypassing the benefit of obfuscation. Versions 2.0.0.RELEASE to 2.0.5.SR01 and 2.1.0.RELEASE to 2.1.1.SR01 are affected.
-
22:04
»
Packet Storm Security Recent Files
VMware vFabric tc Server allows users to store the passwords used for JMX authentication in an obfuscated form for organizations where storing passwords in plain text is not permitted. The JMX authentication implementation was incorrectly allowing users to authenticate using the password in either its plain text form or its obfuscated form, bypassing the benefit of obfuscation. Versions 2.0.0.RELEASE to 2.0.5.SR01 and 2.1.0.RELEASE to 2.1.1.SR01 are affected.
-
22:04
»
Packet Storm Security Misc. Files
VMware vFabric tc Server allows users to store the passwords used for JMX authentication in an obfuscated form for organizations where storing passwords in plain text is not permitted. The JMX authentication implementation was incorrectly allowing users to authenticate using the password in either its plain text form or its obfuscated form, bypassing the benefit of obfuscation. Versions 2.0.0.RELEASE to 2.0.5.SR01 and 2.1.0.RELEASE to 2.1.1.SR01 are affected.
-
-
13:00
»
Hack a Day
A little dumpster-diving let [Nick Skvarla] build his vacuum form machine for around $5. He pulled a vacuum cleaner out of the trash, which was tossed away because of a broken power plug. He put it into a box which had been sealed with spray foam and used a piece of pegboard for the top [...]
-
-
16:03
»
SecuriTeam
A vulnerability was identified in certain versions of HP Small Form Factor Microtower and Workstations PC's with Broadcom Integrated NIC Firmware.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
12:00
»
Hack a Day
If you’re attached to that favorite DB-9 interfaced device you should look into this part. FTDI is selling a USB-RS232 adapter as a replacement for DB-9 connectors. They come with USB male or female connections depending on the application and have the same serial footprint and pinout to which you’re accustomed. Using converter cables is [...]