Return-Path: Mailing-List: contact cocoon-users-help@xml.apache.org; run by ezmlm Delivered-To: mailing list cocoon-users@xml.apache.org Received: (qmail 98021 invoked from network); 14 May 2000 10:54:56 -0000 Received: from tele-post-20.mail.demon.net (194.217.242.20) by locus.apache.org with SMTP; 14 May 2000 10:54:56 -0000 Received: from media.demon.co.uk ([158.152.20.147] helo=192.168.0.2) by tele-post-20.mail.demon.net with esmtp (Exim 2.12 #2) id 12qw2s-0007x6-0K for cocoon-users@xml.apache.org; Sun, 14 May 2000 10:54:52 +0000 Date: Sun, 14 May 2000 10:18:46 +0100 From: Jerm Subject: Fwd: Zope discovers a browser security hole To: cocoon-users@xml.apache.org X-Priority: 3 MIME-Version: 1.0 Content-Type: text/plain; Charset=US-ASCII X-Mailer: Mailsmith 1.1.4 (Bluto) Message-Id: X-Spam-Rating: locus.apache.org 1.6.2 0/1000/N Those of you considering building on-line site maintennance with Cocoon, may like to look at this. It is a pretty complicated form of attack, though seems possible. ====== Forwarded Message ====== Date: 10/5/00 2:32 am Received: 10/5/00 2:30 am From: dave@userland.com To: On 10/5/00 at 2:32 am, dave@userland.com wrote: >A UserLand.Com Bulletin sent on 5/9/2000; 7:29:49 PM. >------------------------------------------------------- > > Zope.Org posts a security alert of concern to users of all Web > applications, including Manila. We're studying it now. > > http://www.zope.org/Members/jim/ZopeSecurity/ClientSideTrojan ====== End Forwarded Message ====== ___________________________________________________________________ Jeremy Quinn Karma Divers webSpace Design HyperMedia Research Centre