lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon Jun 12 10:25:23 2006
From: david.loyall at gmail.com (David Loyall)
Subject: Vunerability in yahoo webmail.

Hello, all.

I just received an email with an html attachment, on a yahoo account.

When I opened the mail, yahoo automatically displayed the html, and executed
the code within.  What the hell. =)  It forwarded the message to my contacts
list, (or some other set of addresses, dunno,) and redirected my browser to
a website.

I'm of to a BBQ, and I don't care about yahoo.  So I'm not even going to
read the code and see how this happens.  I'm attaching the html file as a
text file.  Enjoy!

Oh, I've CC'd abuse@...oo.com, but if someone else would give them a proper
write-up, and encourage them to close the hole, that'd be wonderful.

Cheers,
--David Loyall
Omaha, Nebraska
David Loyall <http://david.loyall.googlepages.com>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060611/b5b05333/attachment.html
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: yahoovuln.txt
Url: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060611/b5b05333/yahoovuln.txt

Powered by blists - more mailing lists