lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 25 Dec 2008 03:03:19 -0700 From: Already-sended-information-to-security-focus@...linator.com To: bugtraq@...urityfocus.com Subject: Re: Google Chrome Browser (ChromeHTML://) remote parameter injection POC This won't work since google chrome will ask for user permission. btw, it cannot launch the applet even you have given out the permission.
Powered by blists - more mailing lists