-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I've not tested Konqueror but it could also be vulnerable. Javascript is the problem not the rendering engine.
I've been receiving emails that I should release the exploit tomorrow, what is the opinion on this list? Would it be more benefit if I did release it? It would only affect Safari but provide useful insight for securing OpenID servers. Cheers Gareth On Wed, 28 Mar 2007 18:34:14 +0100 "Paul C. Bryan" <[EMAIL PROTECTED]> wrote: >Hi all: > >Is this an issue with just Safari, or KHTML (the shared HTML >rendering >engine used in Safari and Konqueror)? > >Paul > >_______________________________________________ >security mailing list >[email protected] >http://openid.net/mailman/listinfo/security -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.5 wpwEAQECAAYFAkYKrbUACgkQrR8fg3y/m1D38QP/duj0/BfWQuHNkN7+3y0TIY4QmFea jg+oddsYvMMzwfHTi7KMHyyS1sJiZuD4wS1giLaIPa3MxQA0bq81SHcB9PAqw3+VH2mc wFIeE+u6MhmZKPpJlbukkhyOZq0NA1NnsGmwiKuQPym2Iy9fp/gu00P1Bh2e0g3FZ9cE idKkVGk= =ZTZG -----END PGP SIGNATURE----- -- Click to become a massage therapist and work for yourself http://tagline.hushmail.com/fc/CAaCXv1JMXeHD93YaDj8r7Yn8c8r0qNn/ _______________________________________________ security mailing list [email protected] http://openid.net/mailman/listinfo/security
