Security Attack Stopped....

I guess it actually worked. I just received this email.....

 

Total impact: 19<br/>
Affected tags: xss, csrf, sqli, id, lfi<br/>
<br/>
Variable: POST.DescriptionMe.0 | Value: My name's
Virgilio Shore but everybody calls me Virgilio.

I'm from Iceland. I'm studying at the college (2nd
year) and I
play the Pedal Steel Guitar for 8 years. Usually I
choose music from my famous films
:).
I have two sister. I like Antiquities, watching TV
(NCIS) and Painting.


Feel free to visit myy web site - &lt;a
href=&quot;removedtobreaklink://tokki.cocolog-nifty.com/blog/2014/03/post-33eb.html&quot;&gt;gaming
updates&lt;/a&gt;<br/>
Impact: 19 | Tags: xss, csrf, sqli, id, lfi<br/>
Description: finds html breaking injections
including whitespace attacks | Tags: xss, csrf |
ID: 1<br/>
Description: finds attribute breaking injections
including whitespace attacks | Tags: xss, csrf |
ID: 2<br/>
Description: Detects obfuscated script tags and
XML wrapped HTML | Tags: xss | ID: 33<br/>
Description: Detects basic SQL authentication
bypass attempts 2/3 | Tags: sqli, id, lfi | ID:
45<br/>
<br/>
REMOTE_ADDR: 81.4.125.166
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:
SCRIPT_FILENAME:
/var/pathto/towtalk.net/httpdocs/join.php
QUERY_STRING:
REQUEST_URI: /join.php
QUERY_STRING:
SCRIPT_NAME: /join.php
PHP_SELF: /join.php

http://towtalk.net ... Hosted by Zarconia.net!
Quote · 28 Jun 2014

This could be the first documented case of POSIDS ever working. Congratulations.

My opinions expressed on this site, in no way represent those of Boonex or Boonex employees.
Quote · 29 Jun 2014
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.