lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: contact_jamie_fisher at (jamie fisher)
Subject: XSS in "Spyware installs with no interaction in IE on fully patchedXP SP2 box"

Above is a measly example of XSS - upload any file you like if you want to the site with XSS; seems to be open to all sorts - but I just spidered the web app and there appears to be quite a number of scripts that are pushing the applications down your wire...  Not 100% sure but I'd guess that since this is seems to be the sort of site people would visit to get their windows wares it stands to reason that someone would upload a file like in the example above in order to do...  I haven't had the opportunity to see where the .cab is being pushed from - whether on site or off.  Would it be worth investigating?

Willem Koenings <> wrote:


> > I was unable to verify it, since I don't use IE, and would prefer not 
> > infecting myself on accident, however I did run across this: 
> > 
> > 
> > 
> > Perhaps one of the themes you downloaded was bundled with the spyware? 
> two tiny links from there: 

btw, old trusty IE 5.01 + manually configured security settings =
no problem at all. either XP+SP2 broke seriously something in IE
or Geraldo Rivera has just poorly configured internet setting.

Sign-up for Ads Free at

Full-Disclosure - We believe in it.

 ALL-NEW Yahoo! Messenger - all new features - even more fun!  
-------------- next part --------------
An HTML attachment was scrubbed...

Powered by blists - more mailing lists