lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <313EB7592143D411AF5800B0D03D04D4022614C1@geezil.somerville.ma.us> From: PNIXON at ci.somerville.ma.us (PNIXON@...somerville.ma.us) Subject: New exploit now circulating? I'm also curious if it changes between sources or if it's something that can be blocked at a firewall? -----Original Message----- From: Kristian Hermansen [mailto:khermansen@...technology.com] Sent: Wednesday, March 24, 2004 3:06 PM To: full-disclosure@...ts.netsys.com; jherm@...kass.com Subject: [Full-Disclosure] New exploit now circulating? It looks like the new iFrame exploit is making the rounds, so has anyone analyzed the payload yet (see below)? Or is this just the new Netsky.P? Is it linking to a local file or within the email itself? What's going on here or did I miss something? cid:031401Mfdab4$3f3dL780$73387018@...81fa70Re What is this link when deciphered? Kristian Hermansen khermansen@...technology.com _____ From: hobknob@...eyard.net [mailto:hobknob@...eyard.net] Sent: Wednesday, March 24, 2004 2:35 PM To: webmaster@...otoys.com Subject: Mail Delivery (failure webmaster@...otoys.com) If the message will not displayed automatically, follow the link to read the delivered message. Received message is available at: www.zerotoys.com/inbox/webmaster/read.php?sessionid-797 -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040324/26a08e89/attachment.html
Powered by blists - more mailing lists