lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <29687652.333711147038682812.JavaMail.juha-matti.laurio@netti.fi> Date: Mon, 8 May 2006 00:51:22 +0300 (EEST) From: Juha-Matti Laurio <juha-matti.laurio@...ti.fi> To: bugtraq@...urityfocus.com Subject: Re: Firefox 1.5.0.3 code execution exploit This URL listed has been updated to include more recent (background) information from Mr. Gavin Sharp on 7th May. The original testcase URL is located at http://www.gavinsharp.com/tmp/ImageVuln2.html now. - Juha-Matti > > try this with Firefox 1.5.0.3 > »www.gavinsharp.com/tmp/ImageVuln.html