The latest version is 8.7.3.25.9, there is no 8.7.4.X, yet.
And yes, you missed something, (without the quotes) ” –data-binary @-“
This turns it into a HTTP POST request and uses the input from stdin.
Otherwise you just do a regular HTTP GET which gets blocked because it’s
not authenticated.
On Mon, Jan 12, 2015 at 10:20 PM, Martin Schuhmacher <broetchen25 () gmx net>
wrote:
Technical Details:
“Internet Explorer XSS Filter Bypass Vulnerability” is done by…
1. Inject “a href” link into target page.
(Not script, allowed by filter)
2. User clicks this injected link.
(Clickjacking etc)
3. URL of this…
Yes, you should. For those out there who don’t routinely find
vulnerabilities, it is hard for them to understand that these issues
aren’t hard to find if you know what you’re looking for. Quite a few
bugs I’ve found in the past have been found by others independently
and published before I got around to it. It happens a LOT more than
people think.
Also, I think companies that sell security software should be…
I’m sure you’re all sick to death of hearing about Lizard Squad and the
skid marks they’re leaving all over the place, so we’ll make this brief:
Lizard Squad has been rekt and the source code for their bots is now
available for your viewing pleasure.