lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200405271932.i4RJW9T0008840@web111.megawebservers.com> Date: Thu, 27 May 2004 19:32:09 -0000 From: "http-equiv@...ite.com" <1@...ware.com> To: <bugtraq@...urityfocus.com> Subject: Re: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability <!-- <a onmouseover="window.status='http://www.the-url-you- see.com;return true" title="The Link" onmouseout="window.status='Whatever-you-like-here';return true" href='http://www.some-other-url.com'>The link</a> --> the point of the exercise is that default settings for the most popular MUA's out there today have scripting disabled. -- http://www.malware.com