lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 20 May 2005 10:39:57 -0500
From: "David Corn" <>
To: "Bakchodiya" <>, <>
Subject: RE: Security issue in Microsoft Outlook

This can fool people but it's not a bug in my opinion.  It's the same as

<a href=></a>

You can also achieve this by typing a url and right clicking it then by
clicking edit hyperlink, then you can change the values to mask it.  So
this is not a bug just a feature that can be used to trick users.

David Corn
Security Consultant
Covetrix, IT Consulting Group
Phone: 214-575-9583 x116
Fax: 214-575-9584

-----Original Message-----
From: Bakchodiya [] 
Sent: Wednesday, May 18, 2005 3:28 PM
Subject: Security issue in Microsoft Outlook

An issue has been discovered in MS Outlook (All
Versions) where anyone can fake a URL & send it

How does it work:

Lets compose an email in MS Outlook, lets type & put a space after it to
make it a link. Now put your cursor just before
cybertrion & type any URL for eg: now send it to anyone. The
receiver will see the URL as
but when he clicks on it it will directly take him to

I am not sure how critical this is but it can fool
alot of people & result in download of a virus.

For more details and Discovered by:
Cybertrion Systems,

Do you Yahoo!? 
Yahoo! Mail - Find what you need with new enhanced search.
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists