lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <009e01c42489$207c19e0$3358b350@fucku>
From: theinsider at 012.net.il (Rafel Ivgi, The-Insider)
Subject: Internet Explorer XSS published unpatched in SP1 AND SP2

Hi!

2 weeks ago i discovered this XSS:
<p id=cool align=center style="height: expression(alert('xss'))">s</p>
in Internet Explorer(fully patched and with SP2)

I also discoverd they Liu Die Yu(greetings pal) discovered it a long time 
ago.
<IMG width="0" height="0" style="width: expression(alert());">
More details at:
http://www.securiteam.com/windowsntfocus/6J006156AS.html

This means it was not patched, even in SP2.
This vulnerability does not effect outlook express.

Rafel Ivgi, The-Insider. 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ