> -Original Message-
> From: Thijs Lensselink [mailto:d...@lenss.nl]
> Sent: Tuesday, October 12, 2010 9:26 PM
> To: php-general@lists.php.net
> Subject: Re: [PHP] Zend studio location Cross-Domain
> Scripting Vulnerability
>
> On 10/13/2010 12:19 AM, Daevid
On 13 October 2010 05:25, Thijs Lensselink wrote:
> On 10/13/2010 12:19 AM, Daevid Vincent wrote:
>>
>> http://80vul.com/Zend%20studio/Zend%20studio%20location%20Cross.htm
>>
>> Interesting. A co-worker and I were JUST noticing how our PHPDoc comments
>> were being parsed pretty much verbatim inc
On 10/13/2010 12:19 AM, Daevid Vincent wrote:
http://80vul.com/Zend%20studio/Zend%20studio%20location%20Cross.htm
Interesting. A co-worker and I were JUST noticing how our PHPDoc comments
were being parsed pretty much verbatim including tags and links and
stuff and thought, "wow, that's stupid
http://80vul.com/Zend%20studio/Zend%20studio%20location%20Cross.htm
Interesting. A co-worker and I were JUST noticing how our PHPDoc comments
were being parsed pretty much verbatim including tags and links and
stuff and thought, "wow, that's stupid, that's just a XSS or injection
waiting to happ
4 matches
Mail list logo