BugTraq
Back to list
|
Post reply
Re: EEYE: Internet Explorer Object Data Remote Execution Vulnerability
Aug 21 2003 04:57AM
http-equiv (at) excite (dot) com [email concealed] (1 malware com)
<!--
This attack may be utilized wherever IE parses HTML,
including web sites, e-mail, newsgroups, and within
applications utilizing web-browsing functionality.
-->
W0W !
[harmless .exe]
http://www.malware.com/drew.html
ouch !
--
http://www.malware.com
[ reply ]
Privacy Statement
Copyright 2010, SecurityFocus
<!--
This attack may be utilized wherever IE parses HTML,
including web sites, e-mail, newsgroups, and within
applications utilizing web-browsing functionality.
-->
W0W !
[harmless .exe]
http://www.malware.com/drew.html
ouch !
--
http://www.malware.com
[ reply ]