WebApp Sec mailing list archives
Re: [Full-disclosure] Attacking the local LAN via XSS
From: Schanulleke <schalulleke () gmail com>
Date: Fri, 04 Aug 2006 09:21:56 +0200
pdp (architect) wrote:
2. border router vulnerable to XSS
Main lessons to be learned: * The border still exists, but is only important for QoS purposes. * Do not manage routers via http Schanulleke. ------------------------------------------------------------------------- Sponsored by: WatchfireDo you test web applications for XSS, SQL Injections, Buffer Overflows, Logical issues and other web application security threats? Why not automate this work with Watchfire's AppScan, the world's leading automated web application scanner. Download AppScan today!
https://www.watchfire.com/securearea/appscancamp.aspx?id=701300000008BP9 --------------------------------------------------------------------------
Current thread:
- Attacking the local LAN via XSS pdp (architect) (Aug 03)
- Re: [Full-disclosure] Attacking the local LAN via XSS Schanulleke (Aug 04)
- Message not available
- Re: [Full-disclosure] Attacking the local LAN via XSS pdp (architect) (Aug 04)
- Re[2]: [Full-disclosure] Attacking the local LAN via XSS Thierry Zoller (Aug 04)
- Re: Re[2]: [Full-disclosure] Attacking the local LAN via XSS pdp (architect) (Aug 04)
- Re: [Full-disclosure] Attacking the local LAN via XSS Nikolay Kubarelov (Aug 07)
- Re: [Full-disclosure] Attacking the local LAN via XSS Dude VanWinkle (Aug 08)
- Re: [Full-disclosure] Attacking the local LAN via XSS pdp (architect) (Aug 04)