similar to: Question on the XSS Security Patch

Displaying 20 results from an estimated 20000 matches similar to: "Question on the XSS Security Patch"

2012 Aug 10
0
Missing earlier versions work around for "XSS Vulnerability in strip_tags"
The rubyonrails-security announcement for CVE-2012-3465 "XSS Vulnerability in strip_tags" mentions that a work around for earlier versions should be attached, but there''s none, only patches for 3.0 series and up. Is the work around available? If so, where can I get hold of it? Thanks in advance, Peter -- Posted via http://www.ruby-forum.com/. -- You received this message
2006 Jan 09
3
XSS prevention with Rails
Hi! I wanna take a stab at implementing better XSS prevention for Rails. This time for real =) I''m wondering what would be the better way, clean everything up with tidy first and then do the rest with regexp or regexp all the way? Anybody done this before? Thanks! Ciao! Florian
2009 Jun 04
0
XSS (was Re: Centos 5.3 -> Apache - Under Attack ? Oh hell....)
Bob Hoffman wrote: > Since each install uses the same pages basically, it is easy for a autobot > to find them all and zero day your forums, xss your whatever, and so on. > > Dang scary to leave JS on at all....even though you basically have too. Mozilla is beginning to address this issue with Content Security Policy -=-
2002 May 13
0
FreeBSD Security Notice FreeBSD-SN-02:02
-----BEGIN PGP SIGNED MESSAGE----- ============================================================================= FreeBSD-SN-02:02 Security Notice The FreeBSD Project Topic: security issues in ports Announced: 2002-05-13 I. Introduction Several ports in the FreeBSD Ports
2006 Jan 26
0
Article about protecting Rails apps from XSS attacks
Cross-Site scripting (XSS) attacks have been appearing lately, so I wrote up an article about one way to protect yourself. It''s pretty easy to use and, for those who care, I go into some of metaprogramming techniques I used to create it. Check it out at http://blog.explorationage.com/articles/2006/01/25/how-to-protect-your-rails-apps-against-cross-site-scripting-attacks Justin p.s. My
2010 Feb 02
0
[Security] Loofah has an HTML injection / XSS vulnerability, please upgrade to 0.4.6
Synopsis ---------- Loofah::HTML::Document#text emits unencoded HTML entities prior to 0.4.6. This was originally by design, since the output of #text is intended to be used in a non-HTML context (such as generation of human-readable text documents). However, Loofah::XssFoliate''s default behavior and Loofah::Helpers#strip_tags both use #text to strip tags out of the output, meaning that
2006 May 05
4
Is sanitize() strong enough to protect me from XSS?
Haven''t been able to find a good enough answer on whether using sanitize() is enough to really protect me from XSS attacks I basically have a blog page that I want to allow people to display comments on but would like to allow html tags to be posted on the comments, these could html tags like the imageshack img tags, youtube player, photobucket img tags etc any other approaches or
2012 Jan 26
3
Puppet Dashboard 1.2.5 Available [security update - moderate]
Welcome to the first Puppet Dashboard maintenance release of the new year. This release includes a security update to address CVE-2012-0891, a XSS vulnerability discovered by David Dasz <david@dasz.at>. We have classified the risk from this exposure as moderate. All Puppet Dashboard users are encouraged to upgrade when possible. Puppet Enterprise users should visit
2003 Jan 22
1
FW: Microsoft Security Bulletin MS02-070: Flaw in SMB Signing Could Enable Group Policy to be Modified (309376)
All, Could this patch in any way cause problems with samba? Thanks, -- Christopher Barry Manager of Information Systems InfiniCon Systems http://www.infiniconsys.com office:610.233.ISIS (4747) direct:610.233.4870 cell:267.879.8321 -----Original Message----- From: Microsoft [mailto:0_43315_DF3995CE-B70B-4C45-84DF-1BC91F60239E_US@Newsletters.Micr osoft.com] Sent: Wednesday, January 22, 2003
2023 Dec 30
1
Again kea DHCP-Server
On 11/2/23 05:41, Rowland Penny via samba wrote: > I never said that Kea couldn't be used with Samba, but I can get those > 56 lines of Kea conf into 7 lines of dnsmasq config. Old bump of thread: But... what you can't do with dnsmasq is send dynamic updates to bind to keep your subnet name resolution straight or handle failover of that function. I'm not a fan of the
2016 Feb 22
3
Dovecot Bulletin
It also got the bulletin out to new users without admin intervention. Sent from Mobile ________________________________ From: Doug Hardie<mailto:bc979 at lafn.org> Sent: ?2/?22/?2016 4:02 To: Dovecot Mailing List<mailto:dovecot at dovecot.org>; Timo Sirainen<mailto:tss at iki.fi> Cc: Kevin Kershner<mailto:cstkersh at outlook.com> Subject: Re: Dovecot Bulletin > On 20
1998 Sep 04
0
FW: Microsoft Security Bulletin (MS98-013)
-----Original Message----- From: Microsoft Product Security Response Team [mailto:secure@MICROSOFT.COM] Sent: Friday, September 04, 1998 10:52 AM To: MICROSOFT_SECURITY@ANNOUNCE.MICROSOFT.COM Subject: Microsoft Security Bulletin (MS98-013) Microsoft Security Bulletin (MS98-013) -------------------------------------------------------------------- Fix available for Internet Explorer Cross Frame
2016 Feb 21
2
Dovecot Bulletin
I'd like to revisit and old post if I may, will/does Dovecot support the old qpopper "Bulletin" ability? Basically I need a simple way of posting bulletins to all domain users. Qpopper maintained a bulletin db for each user and sent them the next bulletin in sequence. Thanks in advance Kevin
2007 May 28
2
Rails, respond_to? over anonymous module (extend has_many).
Hello List, I''m trying to generate examples for some list-helpers I have coded which use in my projects. Basically, the Playlist class uses one anonymous module in has_many that acts as helper between acts_as_list and my desired API: class Playlist < ActiveRecord::Base # associations go here has_many :playlist_items, :order => :position, :dependent => :destroy has_many
2010 Feb 11
0
Enabling KSM with ksmctl under Centos 5.4
Are their any good guides out there on how to use ksmctl to enable and tune KSM performance on Centos/RedHat At the moment the only guidelines I can find are from the following OLS paper, plus the Linux Kernel Docs. * http://www.kernel.org/doc/ols/2009/ols2009-pages-19-28.pdf * http://www.kernel.org/doc/Documentation/vm/ksm.txt On a basic dual core testbed with 4GB Ram and 4-5 VMs I've
1999 Mar 17
0
CIAC Bulletin J-035: Linux Blind TCP Spoofing
Enjoy.... ugh. Dan ____________________________________________________________________________ Dan Yocum | Phone: (630) 840-8525 Computing Division OSS/FSS | Fax: (630) 840-6345 .~. L Fermi National Accelerator Lab | email: yocum@fnal.gov /V\ I P.O. Box 500 | WWW: www-oss.fnal.gov/~yocum/ // \\ N Batavia, IL
2015 Aug 11
4
Apache mod_perl cross site scripting vulnerability
Hello, I've failed latest PCI scan because of CVE-2009-0796. Centos 6.7. The Red Hat Security Response Team has rated this issue as having moderate security impact and bug as wontfix. Explanation: The vulnerability affects non default configuration of Apache HTTP web server, i.e cases, when access to Apache::Status and Apache2::Status resources is explicitly allowed via <Location
2016 Aug 31
2
autoexpunge clarification
Thanks Philon, I did read the extra bullets, as indicated in my email below. But your "When the user quits and thus closes his mailbox/connection" is more clear than "after the client is already disconnected", since the latter is really anytime, rather than at the time they quit. I can guess that the bulletin about LMTP similarly means at the end of each time LMTP delivers
2005 Aug 17
2
MMX loop filter for theora-exp
Hello, I would like to announce the semi-optimized oc_state_loop_filter_frag_rows It gains like 7% speedup. Unfortunately it has some issues: 1) wont compile on 64bit (I will fix it later hopefully) 2) is not yet fully optimized (instruction stalls) Here are the results. CPU: Athlon, speed 1466.91 MHz (estimated) Counted CPU_CLK_UNHALTED events (Cycles outside of halt state) with a unit mask
2007 Sep 27
6
Security + Rails =Joke?
Hi, http://dev.rubyonrails.org/ticket/8453 http://dev.rubyonrails.org/ticket/8371 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3227 I came across the above by accident. While I am subscribed to the so called rails security list where supposed announcement of security issues were to be posted, neither of the above problem made the list. While I use rails a lot and like it, the above