lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAFDPsDW5f_3xQxs2F68yaM_mqkzT0j72ODu_cfwE2WgYnK19Tw@mail.gmail.com> Date: Sun, 10 Jan 2016 23:00:37 +1100 From: metalkey net <6d3374346c6b33@...il.com> To: fulldisclosure@...lists.org Subject: [FD] Google Chrome - Javascript Execution Via Default Search Engines Google Chrome allows execution of Javascript via the Default Search Engines feature. An exploit can be created to take advantage of this issue by manipulating the master_preferences file on a victim's machine. Video Example: https://www.youtube.com/watch?v=WoF-LkA6fMk Walkthrough: https://m3t4lk3y.wordpress.com/category/google-chrome-search-poison/ _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/