lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 19 May 2005 15:57:33 +0200
From: Joachim Schipper <>
Subject: Re: Re: Security issue in Microsoft Outlook

On Wed, May 18, 2005 at 10:07:54PM -0700, Harshad wrote:
> This issue was originally discovered by Harry from http://
> & The article is stolen from
> posted on May 06 2005
> ..Lol....the poser below copies most of the articles from Securityalertz on his
> so called security sites claiming them to be his....
> Bakchodiya <> wrote:
>     An issue has been discovered in MS Outlook (All
>     Versions) where anyone can fake a URL & send it
>     across.
>     How does it work:
>     Lets compose an email in MS Outlook, lets type
> & put a space after it to
>     make it a link. Now put your cursor just before
>     cybertrion & type any URL for eg:
> now send it to anyone. The
>     receiver will see the URL as
>     but when he clicks on it it will directly take him to
>     I am not sure how critical this is but it can fool
>     alot of people & result in download of a virus.

Erm... do you *want* to admit to 'discovering' this? ;-)


Content of type "application/pgp-signature" skipped

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists