[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4E8DA29D.2080901@vulnerability-lab.com>
Date: Thu, 06 Oct 2011 14:44:13 +0200
From: "research@...nerability-lab.com" <research@...nerability-lab.com>
To: Andreas <mailinglisten@...workx.org>,
full-disclosure@...ts.grok.org.uk
Subject: Re: 0day Full disclosure: American Express
ack
Am 06.10.2011 14:38, schrieb research@...nerability-lab.com:
> Hey Andreas,
> read the following article its fresh and new ...
> http://www.vulnerability-lab.com/dev/
> This is 4 real ^^
>
>
> Am 06.10.2011 12:18, schrieb Andreas:
>> Zitat von Carlos Alberto Lopez Perez <clopez@...lia.com>:
>>
>>> American Express admins looks really worried by security....
>>>
>>> At least they thought about the remote possibility of google
>>> indexing the admin panel,
>>> so they disabled it at https://www.americanexpress.com/robots.txt
>>>
>>> smart move :-)
>> because RewriteCond is hardcore stuff >_<
>>
>> ups, it's an ibm httpd server.
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>>
>
--
Website: www.vulnerability-lab.com ; vuln-lab.com or vuln-db.com
Contact: admin@...nerability-lab.com or support@...nerability-lab.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists