Re: [Full-disclosure] Cross Site Hacking Browser Injection Attack Vulnerability Paradigms

2007-10-20 Thread Valdis . Kletnieks
On Sat, 20 Oct 2007 15:46:36 EDT, [EMAIL PROTECTED] said: > 1) What browser was first vulnerable to these attacks, > 2) Who was the responsible developer, I don't know for sure, but I *do* know that whichever developer it was didn't read the copious notices regarding active content in RFC1341, in

Re: [Full-disclosure] Cross Site Hacking Browser Injection Attack Vulnerability Paradigms

2007-10-20 Thread phioust
You should email the former lorian of TESO as him and his dreamweaver expert friends have already started great research into this subject. They spend all day on the freenode webappsec channel discussing the latest and greatest utf xss filter bypass vulnerabilities. Just imagine if gnucitizen (pdp

Re: [Full-disclosure] Cross Site Hacking Browser Injection Attack Vulnerability Paradigms

2007-10-20 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 lol what a blonde i forgot my citations one second [1] http://www.gnucitizen.org [2] http://pax.grsecurity.net Thanks! On Sat, 20 Oct 2007 15:46:36 -0400 [EMAIL PROTECTED] wrote: >Hello friends, > >I am a PhD student writing my dissertation on cross

[Full-disclosure] Cross Site Hacking Browser Injection Attack Vulnerability Paradigms

2007-10-20 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello friends, I am a PhD student writing my dissertation on cross site scripting related attacks, which I have learned is the true Achilles heel of Intraweb exploration technologies. One detail I am unable to find with the assistance of the Internet