Jump to content

Search the Community

Showing results for tags 'htmlcache'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Using and Managing Revive Adserver
    • Documentation
    • Using Revive Adserver
    • Managing Revive Adserver
    • Bugs
  • Advanced Topics
    • Performance, Scalability, and Reliability
    • For Developers
  • Revive Adserver Community
    • Revive Adserver Project News and Announcements
    • Feature Requests
    • Plugins
    • Requests for Consulting
    • Off Topic

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL

Found 1 result

  1. Today, I discovered another hack of my adserver. I'd had version 3.1, with the usual precautions, file permissions, etc. The new hack appended a Javascript to the text in the "htmlcache" field. There was nothing in the "append" or "prepend" fields. The script was tacked onto the intended text. It put an iframe (calling an undesired URL) at an absolute position, did something with cookies (?), and then put another absolute-position iframe with another undesired different URL. I've forwarded specific details to the proper e-mail address for this issue; I haven't yet heard back. I have been unable to locate any other instances of this particular hack, either here on through Google in general. I know that details, etc, are not to be posted here, but I wanted to post something, so people would be aware of the issue. If you've got unintended ads being served up on your site, and if you can't find anything in the "prepend" or "append" fields, check in "banners" for coding in "htmlcache" that doesn't match what you'd intended. Eliz.
×
×
  • Create New...