lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1294.84.92.244.131.1173755629.squirrel@www.ddosed.com>
Date: Tue, 13 Mar 2007 04:13:49 +0100 (CET)
From: security@...ed.com
To: full-disclosure@...ts.grok.org.uk
Subject:  XSS on eplus.de, german mobile telephony provider

Hi Hanno Böck,

We have mirrored the affected websites on XSSed.com. You are welcome to
post to XSSed.com any more XSS vulnerabilities that you discover.

To the rest of the subscribers and readers of Full-disclosure - if you
find a XSS vulnerable website, you can post it on www.XSSed.com. The
affected websites are saved automatically in the on-hold archive until
review by our staff. We classify the published websites into high-profiled
- gov, mil, famous - and not. If you want to know more about the goals of
XSSed.com, please read this news:
http://www.xssed.com/news/22/XSSed.com_What_Who_Why/


We allow submission of vulnerabilities that can be exploited against
users, such as http response splitting, frame injection, CSRF/XSRF.


Dim
--
XSSed.com

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ