lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200406160922.i5G9MmEw003651@web173.megawebservers.com> Date: Wed, 16 Jun 2004 09:22:48 -0000 From: <liudieyu@...rella.name> To: <bugtraq@...urityfocus.com> Subject: Fwd : FD/IE: Popup object fakes the location field to moderator: just got another excellent site spoofing exploit - i didn't notice this msg on bugtraq. this exploit is not perfect. Digest: excellent site spoofing exploit found in the wild FullDisclosure: US Bank scam David Lederman (delphi4pro_at_yahoo.com) http://umbrella.name/iebug.com/display-singlemessage.php?readmsg:fulldisclosure_message-2004060449 Demo: http://www.bis1bp.com/a12/index.html works perfectly on ie6 running on win2k.en. Ad: up2hour ie/oe/wmp/jvm news: iebug.com