lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon Mar 6 13:55:18 2006 From: davek_throwaway at hotmail.com (Dave Korn) Subject: Re: Re: Arin.net XSS Terminal Entry wrote: > Dave, > > You need to copy and paste the full URL into your browser for the XSS > to take place. All exploit examples are still working as I just > verified. > > <copy> > http://ws.arin.net/whois/?queryinput=%3CIMG+SRC%3D%22javascript%3Aalert%28%27XSS%27%29%3B%22%3E > </paste> > Yep, it's the IE-vs-Firefox thing that meant it didn't work for me. I can reproduce it fine in IE. cheers, DaveK -- Can't think of a witty .sigline today....