: Sunday, November 14, 2010 10:14 PM
Subject: Re: [Full-disclosure] Saved XSS vulnerability in Internet Explorer
But it requires that the user/potential victim go to the URL and save it,
you say? That doesn't quite seem realistic at all in terms of an attack...
On Nov 14, 2010, at 9:56 AM, MustLive
Jack jacksonsmth...@gmail.com
To: Christian Sciberras uuf6...@gmail.com
Cc: Zach C fxc...@gmail.com; full-disclosure@lists.grok.org.uk;
MustLive mustl...@websecurity.com.ua
Sent: Monday, November 15, 2010 6:29 PM
Subject: Re: [Full-disclosure] Saved XSS vulnerability in Internet Explorer
It's
Only those who take security to heart and got hacked can see the real impact.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
It's logical to RSnake's
http://ha.ckers.org/blog/20070201/firefox-save-as-complete-issue/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
But it requires that the user/potential victim go to the URL and save it, you
say? That doesn't quite seem realistic at all in terms of an attack...
On Nov 14, 2010, at 9:56 AM, MustLive mustl...@websecurity.com.ua wrote:
Hello Full-Disclosure!
I want to warn you about Cross-Site Scripting
...rename it and run it again.
If MustLive says so, it must be realistic...
On Sun, Nov 14, 2010 at 9:14 PM, Zach C fxc...@gmail.com wrote:
But it requires that the user/potential victim go to the URL and save it,
you say? That doesn't quite seem realistic at all in terms of an attack...
On