<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: Redirectors: the phantom menace</title>
	<link>http://websecurity.com.ua/3495/</link>
	<description></description>
	<pubDate>Sun, 12 Apr 2026 10:48:28 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3495/#comment-363949</link>
		<pubDate>Wed, 22 Jun 2011 17:15:41 +0000</pubDate>
		<guid>http://websecurity.com.ua/3495/#comment-363949</guid>
					<description>Also redirectors can be used for memory corruption in the browser, which can lead to DoS and code execution. As in case of &lt;a href="/5217/" rel="nofollow"&gt;Microsoft Internet Explorer&lt;/a&gt;.</description>
		<content:encoded><![CDATA[<p>Also redirectors can be used for memory corruption in the browser, which can lead to DoS and code execution. As in case of <a href="/5217/" rel="nofollow">Microsoft Internet Explorer</a>.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3495/#comment-327923</link>
		<pubDate>Sun, 27 Jun 2010 15:50:58 +0000</pubDate>
		<guid>http://websecurity.com.ua/3495/#comment-327923</guid>
					<description>Also redirectors can be used for bypassing of restrictions on URL at HTML Injection attacks, particularly Link Injection. As in case of vulnerability at &lt;a href="/3723/" rel="nofollow"&gt;news.yahoo.com&lt;/a&gt;.

In contrast to bypass of protection filters at using of &lt;a href="/3531/" rel="nofollow"&gt;closed redirectors&lt;/a&gt; (attack #10), in this case not external redirector is using, but internal one (at this site, or at the site from allowed list).</description>
		<content:encoded><![CDATA[<p>Also redirectors can be used for bypassing of restrictions on URL at HTML Injection attacks, particularly Link Injection. As in case of vulnerability at <a href="/3723/" rel="nofollow">news.yahoo.com</a>.</p>
<p>In contrast to bypass of protection filters at using of <a href="/3531/" rel="nofollow">closed redirectors</a> (attack #10), in this case not external redirector is using, but internal one (at this site, or at the site from allowed list).
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3495/#comment-321712</link>
		<pubDate>Mon, 17 May 2010 22:53:01 +0000</pubDate>
		<guid>http://websecurity.com.ua/3495/#comment-321712</guid>
					<description>Also redirectors can be used for conducting of DoS attacks on browsers via redirection to mailto: URL, which I wrote about in post &lt;a href="/4206/" rel="nofollow"&gt;DoS in Firefox, Internet Explorer, Chrome, Opera and other browsers&lt;/a&gt;.</description>
		<content:encoded><![CDATA[<p>Also redirectors can be used for conducting of DoS attacks on browsers via redirection to mailto: URL, which I wrote about in post <a href="/4206/" rel="nofollow">DoS in Firefox, Internet Explorer, Chrome, Opera and other browsers</a>.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3495/#comment-308923</link>
		<pubDate>Tue, 19 Jan 2010 18:07:27 +0000</pubDate>
		<guid>http://websecurity.com.ua/3495/#comment-308923</guid>
					<description>Also redirectors can be used for conducting of XSS attacks via PDF files, which I wrote about in post &lt;a href="/3870/" rel="nofollow"&gt;Script Injection in Adobe Acrobat&lt;/a&gt;.</description>
		<content:encoded><![CDATA[<p>Also redirectors can be used for conducting of XSS attacks via PDF files, which I wrote about in post <a href="/3870/" rel="nofollow">Script Injection in Adobe Acrobat</a>.
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
