lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: attica at stackheap.org (S . f . Stover) Subject: RE: FWD: Internet Explorer URL parsing vulnerability On 09 Dec 03 10:22:59AM S G Masood[sgmasood@...oo.com] wrote: : ># POC ########## : >http://www.zapthedingbat.com/security/ex01/vun1.htm : Interestingly enough, MSIE for OS X doesn't display this behavior. My address bar contained this URL: http://www.microsoft.com%01@...thedingbat.com/security/ex01/vun2.htm -- aka Dolph Longhorn GPG Key ID: 0xF8F859D0 http://pgp.mit.edu:11371/pks/lookup?search=0xF8F859D0&op=index "There is no such thing as right and wrong, there's just popular opinion." -Jeffrey Goines -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 187 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031209/2fe5113e/attachment.bin