On Sat, 20 Oct 2007 15:46:36 EDT, [EMAIL PROTECTED] said:
> 1) What browser was first vulnerable to these attacks,
> 2) Who was the responsible developer,
I don't know for sure, but I *do* know that whichever developer it
was didn't read the copious notices regarding active content in
RFC1341, in
You should email the former lorian of TESO as him and his dreamweaver expert
friends have already started great research into this subject. They spend
all day on the freenode webappsec channel discussing the latest and greatest
utf xss filter bypass vulnerabilities. Just imagine if gnucitizen (pdp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
lol what a blonde i forgot my citations one second
[1] http://www.gnucitizen.org
[2] http://pax.grsecurity.net
Thanks!
On Sat, 20 Oct 2007 15:46:36 -0400 [EMAIL PROTECTED]
wrote:
>Hello friends,
>
>I am a PhD student writing my dissertation on cross
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello friends,
I am a PhD student writing my dissertation on cross site scripting
related attacks, which I have learned is the true Achilles heel of
Intraweb exploration technologies. One detail I am unable to find
with the assistance of the Internet