[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200311130452.hAD4qTIb008242@turing-police.cc.vt.edu>
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: new worm - "warm-pussy.jpg".
On Thu, 13 Nov 2003 01:08:06 PST, Gadi Evron <ge@...tistical.reprehensible.net> said:
> HTML _is_ plain-text.
> Just because the server sends it as plain text doesn't mean the browser
> won't execute it.
>
> It does.
Well.. sure... a .JPG might have some executable code in it, right? :)
At least this time they're improving. They're executing plain text that
was called .jpg. Last time, they executed javascript that was in the
comments field of an actual jpg.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031112/d464a960/attachment.bin
Powered by blists - more mailing lists