lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4304CD00.60606@lava.net>
Date: Thu Aug 18 19:01:45 2005
From: prb at lava.net (Peter Besenbruch)
Subject: Sensitive Information Disclosure Vulnerability
	in	Kinetics Kiosk Product

Jason Coombs wrote:
> The following script error message was noted being displayed this
> morning on an airline check-in kiosk manufactured by Kinetics USA.
> 
> Vendor: Kinetics USA www.kineticsUSA.com
> 
> 
> Line: 107 Char: 2 Error: object expected Code: 0 URL:
> http://151.151.10.46:64080/attract 
> ?time=1124376480&TransactionID=HNL_KIOSK09-050818044716

I have have seen that exact same error message, probably at the exact
same kiosk. Those things are always going down at Honolulu Airport. When
they work, it is reassuring that the first thing they ask for is a
credit card swipe.

-- 
Hawaiian Astronomical Society: http://www.hawastsoc.org
HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ