<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: Local XSS</title>
	<link>http://websecurity.com.ua/4219/</link>
	<description></description>
	<pubDate>Mon, 06 Apr 2026 19:52:33 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/4219/#comment-341662</link>
		<pubDate>Mon, 15 Nov 2010 13:48:53 +0000</pubDate>
		<guid>http://websecurity.com.ua/4219/#comment-341662</guid>
					<description>One more example of Local XSS is &lt;a href="/4677/" rel="nofollow"&gt;Saved XSS vulnerability in Internet Explorer&lt;/a&gt;.</description>
		<content:encoded><![CDATA[<p>One more example of Local XSS is <a href="/4677/" rel="nofollow">Saved XSS vulnerability in Internet Explorer</a>.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/4219/#comment-331044</link>
		<pubDate>Thu, 05 Aug 2010 18:17:14 +0000</pubDate>
		<guid>http://websecurity.com.ua/4219/#comment-331044</guid>
					<description>One more example of Local XSS is &lt;a href="/4432/" rel="nofollow"&gt;Cross-Site Scripting vulnerability in Mozilla, Firefox and other browsers&lt;/a&gt; via redirectors with answer "302 Found".</description>
		<content:encoded><![CDATA[<p>One more example of Local XSS is <a href="/4432/" rel="nofollow">Cross-Site Scripting vulnerability in Mozilla, Firefox and other browsers</a> via redirectors with answer &#8220;302 Found&#8221;.
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
