[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4E8DA12D.8010700@vulnerability-lab.com>
Date: Thu, 06 Oct 2011 14:38:05 +0200
From: "research@...nerability-lab.com" <research@...nerability-lab.com>
To: Andreas <mailinglisten@...workx.org>,
full-disclosure@...ts.grok.org.uk
Subject: Re: 0day Full disclosure: American Express
Hey Andreas,
read the following article its fresh and new ...
http://www.vulnerability-lab.com/dev/
This is 4 real ^^
Am 06.10.2011 12:18, schrieb Andreas:
> Zitat von Carlos Alberto Lopez Perez <clopez@...lia.com>:
>
>> American Express admins looks really worried by security....
>>
>> At least they thought about the remote possibility of google
>> indexing the admin panel,
>> so they disabled it at https://www.americanexpress.com/robots.txt
>>
>> smart move :-)
>
> because RewriteCond is hardcore stuff >_<
>
> ups, it's an ibm httpd server.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
--
Website: www.vulnerability-lab.com ; vuln-lab.com or vuln-db.com
Contact: admin@...nerability-lab.com or support@...nerability-lab.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists