[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] IE Object Type Validation Vulnerability Exploit
- To: "Cael Abal" <lists@xxxxxxxxxx>, <full-disclosure@xxxxxxxxxxxxxxxx>
- Subject: Re: [Full-Disclosure] IE Object Type Validation Vulnerability Exploit
- From: "morning_wood" <se_cur_ity@xxxxxxxxxxx>
- Date: Thu, 18 Sep 2003 13:21:56 +0530
http://morningwood.ethicsdesign.com/fucked4test.html
id that... who cares if its a trojan, you surely didnt think it was
benign??? i didnt click it knowing it was a <object tag exploit.. or try a
HEAD on the link first.. or even
nc -vv someurl.isp/link.html
*sigh*
----- Original Message -----
From: "Cael Abal" <lists@xxxxxxxxxx>
To: <full-disclosure@xxxxxxxxxxxxxxxx>
Sent: Tuesday, September 16, 2003 7:03 PM
Subject: Re: [Full-Disclosure] IE Object Type Validation Vulnerability
Exploit
> > Decrypted (undo VBS.Encode) it is the following:
> > Andreas
>
> Hi Andreas,
>
> The 'x.exe' created by this script is reported by Symantec as
> 'Download.Trojan':
>
> http://www.symantec.com/avcenter/venc/data/download.trojan.html
>
> Cael
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html