ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: MX Injection - Capturing and Exploiting Hidden Mail Servers By Vicente Aguilera Diaz



> -----Original Message-----
> From: robert@xxxxxxxxxxxxx [mailto:robert@xxxxxxxxxxxxx] 
> Sent: Monday, December 11, 2006 5:47 AM
> To: websecurity@xxxxxxxxxxxxx
> Subject: [WEB SECURITY] WASC-Announcement: MX Injection - 
> Capturing and Exploiting Hidden Mail Servers By Vicente Aguilera Diaz
> 
> The Web Application Security Consortium is proud to present 
> 'MX Injection: Capturing and Exploiting 
> Hidden Mail Servers' written by Vicente Aguilera Diaz of 
> Internet Security Auditors. In this article 
> Vicente discusses how an attacker can inject additional 
> commands into an online web mail application 
> communicating with an IMAP/SMTP server. 
> 
> 
> This document can be found at 
> http://www.webappsec.org/projects/articles/ .
> 
> Regards,
> 
> - Robert Auger
> 
> articles_at_webappsec.org
> http://www.webappsec.org
> 



 




Copyright © Lexa Software, 1996-2009.