[prev in list] [next in list] [prev in thread] [next in thread]
List: websecurity
Subject: [WEB SECURITY] Bypassing script filters with variable-width encodings
From: "Chris Weber" <chris () lookout ! net>
Date: 2006-08-11 21:50:56
Message-ID: 013501c6bd8d$7ea68b00$e8a2389d () redmond ! corp ! microsoft ! com
[Download RAW message or body]
Everyone see this? Nothing new but a nice browser comparison.
<http://applesoup.googlepages.com/bypass_filter.txt>
http://applesoup.googlepages.com/bypass_filter.txt
[Attachment #3 (text/html)]
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=us-ascii">
<META content="MSHTML 6.00.2900.2963" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT face=Arial size=2><SPAN class=626112621-11082006>Everyone see
this? Nothing new but a nice browser comparison.</SPAN></FONT></DIV>
<DIV><A href="http://applesoup.googlepages.com/bypass_filter.txt"><FONT
face=Arial><FONT
size=2>http://applesoup.googlepages.com/bypass_filter.txt</FONT></FONT></A></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV></BODY></HTML>
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic