<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: Automatic File Download vulnerabilities in browsers</title>
	<link>http://websecurity.com.ua/2438/</link>
	<description></description>
	<pubDate>Sat, 18 Apr 2026 10:08:43 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/2438/#comment-330354</link>
		<pubDate>Thu, 22 Jul 2010 16:54:53 +0000</pubDate>
		<guid>http://websecurity.com.ua/2438/#comment-330354</guid>
					<description>Yes, it's nice hole :-). But Google fixed it already in Chrome 1.x.

But already in 2008 I have created &lt;a href="/4334/" rel="nofollow"&gt;File Download attack&lt;/a&gt; (which I called SaveAs attack), which could emulate Automatic File Download attack. And it works potentially in all browsers.</description>
		<content:encoded><![CDATA[<p>Yes, it&#8217;s nice hole <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' /> . But Google fixed it already in Chrome 1.x.</p>
<p>But already in 2008 I have created <a href="/4334/" rel="nofollow">File Download attack</a> (which I called SaveAs attack), which could emulate Automatic File Download attack. And it works potentially in all browsers.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: fdfg</title>
		<link>http://websecurity.com.ua/2438/#comment-330351</link>
		<pubDate>Thu, 22 Jul 2010 13:34:16 +0000</pubDate>
		<guid>http://websecurity.com.ua/2438/#comment-330351</guid>
					<description>g :D</description>
		<content:encoded><![CDATA[<p>g <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_biggrin.gif' alt=':D' class='wp-smiley' />
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
