lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <00d801c305e7$caa06780$dd6ffea9@v>
Date: Fri, 18 Apr 2003 22:19:11 +0200
From: "Adam [ckkl]" <ckkl@...zta.wp.pl>
To: <bugtraq@...urityfocus.com>
Subject: IE 6.0 - trivial crash - part II


Hello,

Nothing to add again, just a trivial IE crash.
http://www.sztolnia.pl/hack/TrivialIECrash2/TrivialIECrash2.html

I checked the net and haven't found any other sysmon.ocx 
vulnerability, except this one http://www.ussrback.com/labs57.html 
but this one uses different CLSID. 
Thx to Richard Moore who pointed out my rediscovery in my last post.

Best Regards
Adam Blaszczyk
reverser, coder, writer & researcher  [VX/AV]
http://www.symantec.com (Localization Engineer)
http://www.mykakee.com (Home page)
Whatever I say in this e-mail is my private opinion.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ