![]() |
anyone with a fully patched IE6..
.. does either of theese 2 links popup a cmd.exe window for you? Absolutely harmless test.
http://www.signupsluts.com/ie.html http://www.signupsluts.com/ie2.html |
2nd one popped up a window "attempting injection"
|
first one loaded without problems, second one, same popup asPussyMan
Where are you testing it for? |
The first one is trying to use an exploit.
|
Quote:
|
:thumbsup Mozilla Firefox
|
nah doesn't run it
|
ok, that wasn't it though. It tries to execute "cmd.exe /c pause".
Testing for this but didn't get it to work: http://seclists.org/lists/bugtraq/2004/Jul/0026.html |
2nd window: INJECTED
wtf are you doing to my browser :feels-hot |
Quote:
Apparently there's a way to bypass the latest IE securitypatch by using Shell.Application instead of ADODB.Stream (which the latest patch disabled). |
Quote:
|
Quote:
|
Quote:
|
WTF ????
:feels-hot :mad: :feels-hot I got 20 Dollars bills coming out of my printer now !! :1orglaugh |
Quote:
|
In the last couple of weeks I have seen a lot of submissions to my TGP with that injection code in it. I don't know what the hell whoever is submitting it is thinking like they'd get approved with that kind of bullshit.
|
All times are GMT -7. The time now is 06:24 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123