lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri Oct 21 07:55:03 2005 From: nick at virus-l.demon.co.uk (Nick FitzGerald) Subject: New (19.10.05) MS-IE Url Spoofing bug (byK-Gen) Paul Schmehl to Valdis: > > OK, so who designed the Javascript security model? > > Netscape. Ahh -- trick question! There is NO "Javascript security model" so Netscape cannot have designed it... ... Seriously, Javascript was the single worst thing that ever happened to browsers (and the only really stupid, bad thing that is not squarely on MS' shoulders) and permanently opened the whole, stupid "active content" can-o-worms... Regards, Nick FitzGerald
Powered by blists - more mailing lists