-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 lol what a blonde i forgot my citations one second
[1] http://www.gnucitizen.org [2] http://pax.grsecurity.net Thanks! On Sat, 20 Oct 2007 15:46:36 -0400 [EMAIL PROTECTED] wrote: >Hello friends, > >I am a PhD student writing my dissertation on cross site scripting >related attacks, which I have learned is the true Achilles heel of >Intraweb exploration technologies. One detail I am unable to find >with the assistance of the Internet Wayback machine is when and >what browsers first introduced these vulnerabilities. > >So, > >1) What browser was first vulnerable to these attacks, >2) Who was the responsible developer, >3) How was this vulnerable mechanism replicated across all modern >browsers, >4) Instead of patching individual XSS problems in random web-based >piano tuning software, why aren't the serious security >researchers[1] of this list working to develop better technologies >to block the entire vulnerability class, like the PaX/w^x team has >done[2], to raise the ante for computer security list posters >around the world? > >Thanks for your help in advance. -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Charset: UTF8 Version: Hush 2.5 wpwEAQECAAYFAkcaW40ACgkQqTTbVuUWvbIJCQP/V1jGj8znRU91cQc1gdWR1geWuHhe A9hC5dvqDtmLGrk7JvY4LHgZ55Ojv95tW+renUMKIX5+UiDveVZ5mo/xX4d0yERCqfWd 1FuAhYrtgbvDL+kSqmvV5sybp57XQDHterOcf75fputd2rALDzDUKVfNE1rMqFdlEQOt NKmij48= =6Q4d -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
