lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: larry at larryseltzer.com (Larry Seltzer) Subject: What about M$ in the shell: race >>However, the shell: command opens the programs when used locally in the URL bar. If by this you are referring to the preposterous scenario in which someone literally types 'shell:windows\\system32\\calc.exe' or something like it into the Address bar, I just tested it and you're incorrect. I get an Invalid Syntax error. Try again. >>I think it would have to be used with another IE vuln to really create a problem-However, the shell: command opens the programs when used locally in the URL bar. I think it would have to be used with another IE vuln to really create a problem- So because there are vulnerabilities in IE, anything and everything is exploitable? I think you'll have to do better than this. Every bit of real testing I've seen shows this is not a real vulnerability in IE. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blog.ziffdavis.com/seltzer larryseltzer@...fdavis.com
Powered by blists - more mailing lists