[<prev] [next>] [day] [month] [year] [list]
Message-ID: <463AA1A0.3080209@metaeye.org>
Date: Fri, 04 May 2007 08:29:44 +0530
From: Aditya K Sood <zeroknock@...aeye.org>
To: full-disclosure@...ts.grok.org.uk, websecurity@...appsec.org,
pen-test@...urityfocus.com
Subject: Exploitation Realm in Ajax Based Load Tab Modules
Hi all
This analysis compose of the active module checking derived from
AJAX based applications.This vulnerability or bad programming practise
makes the web application vulnerable to XSS scripting and other
Javascript injections.
A very definitive analysis have been undertaken. You can look at the
desired issue at :
http://zeroknock.blogspot.com/2007/05/cutting-edge-research-analysis.html
http://zeroknock.metaeye.org/analysis/
Regards
Aditya K Sood
[MSG} Founder , Metaeye Security G
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists