[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20071020194637.457A722840@mailserver10.hushmail.com>
Date: Sat, 20 Oct 2007 15:46:36 -0400
From: <full-disclosure@....hush.com>
To: <full-disclosure@...ts.grok.org.uk>
Cc:
Subject: Cross Site Hacking Browser Injection Attack
Vulnerability Paradigms
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello friends,
I am a PhD student writing my dissertation on cross site scripting
related attacks, which I have learned is the true Achilles heel of
Intraweb exploration technologies. One detail I am unable to find
with the assistance of the Internet Wayback machine is when and
what browsers first introduced these vulnerabilities.
So,
1) What browser was first vulnerable to these attacks,
2) Who was the responsible developer,
3) How was this vulnerable mechanism replicated across all modern
browsers,
4) Instead of patching individual XSS problems in random web-based
piano tuning software, why aren't the serious security
researchers[1] of this list working to develop better technologies
to block the entire vulnerability class, like the PaX/w^x team has
done[2], to raise the ante for computer security list posters
around the world?
Thanks for your help in advance.
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Charset: UTF8
Version: Hush 2.5
wpwEAQECAAYFAkcaWxwACgkQqTTbVuUWvbLPGgQAlzDzl4PTINCvlRdco/1zocWJbJyg
CGfRjA6joWhUeRSwfeGvoNnulX3RbXLYePYcvrspZmVrM0mzj4q+tUCPm7Sh0eKfgof/
NvZWCwVKOsaDTNZSgR7yS3QYJ3R+ekdQi/3nYz61iUFFBkbqi+F8KAQmAGtIcOQgp1EN
R093Phw=
=43if
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists