lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: 22 May 2004 02:45:02 -0000 From: roozbeh afrasiabi <roozbeh_afrasiabi@...oo.com> To: bugtraq@...urityfocus.com Subject: Re: Internet explorer .clsid vulnerability In-Reply-To: <8B32EDC90D8F4E4AB40918883281874D523591@...xwin2k1.secnet.pivx.com> >This is actually a behavior that is part of Windows Explorer, not Internet Explorer. I think we have covered this in the past on lists as well. If it is not already documented somewhere it should be, as this is how Windows file queries (inside IE) are performed on the local file system. The following would execute netmeeting on ie.6 when tested from an internet site but it dose not work on ie.6+sp1 . <a href="c:\x.{3E9BAF2D-7A79-11d2-9334-0000F875AE17}">here</a> <a href="c:\.{3E9BAF2D-7A79-11d2-9334-0000F875AE17}">here</a> Thanx for the info ---> me gone searching fo' more
Powered by blists - more mailing lists