lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <40F09B3E.9010608@xillioncomputers.com> From: nikon at xillioncomputers.com (Nick Eoannidis) Subject: Re: shell:windows Larry Seltzer eWEEK.com Security Center Editor -- buddy, the shell:windows URI handler was disabled in IE ages ago! The fact it can be crafted into an exploit for Mozilla! is the issue here. Of course it wont work on your IE your probably patched to the max! Mozilla just forgot to disable access to this URI due to the fact that mozilla was first built for nix and not windoze. All versions of mozilla have been fixed now Nikon Xillion Computers Trust your Technolust http://www.xillioncomputers.com nikon@...lioncomputers.com -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/x-pkcs7-signature Size: 5240 bytes Desc: S/MIME Cryptographic Signature Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040711/280a490f/smime.bin