[13740] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Sprint PCS vulnerable to malicious tags

daemon@ATHENA.MIT.EDU (James Seymour)
Mon Feb 7 18:40:17 2000

Message-Id:  <20000207124624.BB2182C15B@skynet.medar.com>
Date:         Mon, 7 Feb 2000 07:46:24 -0500
Reply-To: James Seymour <jseymour@MEDAR.COM>
From: James Seymour <jseymour@MEDAR.COM>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM

> Message-ID:  <20000204192231.560.qmail@securityfocus.com>
> Date:         Fri, 4 Feb 2000 19:22:31 -0000
> From: Paul Schreiber <shrub@YAHOO.COM>
> Subject:      Sprint PCS vulnerable to malicious tags
>
> I'm sure you're all familiar with the CERT advisory:
>   http://www.cert.org/advisories/CA-2000-02.html
>
> Sprint PCS's web site is vulnerable to this flaw. ...
[snip]
>

I'm not trying to down-play the significance of this: but I think
we all know that there are likely literally thousands of Web sites
all over the world--perhaps many of them as dependent as SprintPCS
on using Web forms for processing sensitive (customer) data.  If
they're all reported here...


Regards,
Jim
--
Jim Seymour                         | Medar, Inc.
jseymour@medar.com                  | 24775 Crestview Ct.
Systems & Network Administrator     | Farmington Hills, MI. 48335
                                    | FAX: (248)477-8897

home help back first fref pref prev next nref lref last post