Bugtraq mailing list archives
Re: EEYE: Internet Explorer Object Data Remote Execution Vulnerability
From: "http-equiv () excite com" <1 () malware com>
Date: Thu, 21 Aug 2003 04:57:20 -0000
<!-- This attack may be utilized wherever IE parses HTML, including web sites, e-mail, newsgroups, and within applications utilizing web-browsing functionality. --> W0W ! [harmless .exe] http://www.malware.com/drew.html ouch ! -- http://www.malware.com
Current thread:
- EEYE: Internet Explorer Object Data Remote Execution Vulnerability Marc Maiffret (Aug 21)
- Re: EEYE: Internet Explorer Object Data Remote Execution Vulnerability Nerijus Krukauskas (Aug 22)
- Re: EEYE: Internet Explorer Object Data Remote Execution Vulnerability Fabio Pietrosanti (naif) (Aug 26)
- RE: EEYE: Internet Explorer Object Data Remote Execution Vulnerability Drew Copley (Aug 28)
- Re: EEYE: Internet Explorer Object Data Remote Execution Vulnerability Fabio Pietrosanti (naif) (Aug 26)
- <Possible follow-ups>
- EEYE: Internet Explorer Object Data Remote Execution Vulnerability Marc Maiffret (Aug 21)
- Re: EEYE: Internet Explorer Object Data Remote Execution Vulnerability http-equiv () excite com (Aug 21)
- RE: EEYE: Internet Explorer Object Data Remote Execution Vulnerability Menashe Eliezer (Aug 22)
- RE: EEYE: Internet Explorer Object Data Remote Execution Vulnerability Drew Copley (Aug 28)
- Re: EEYE: Internet Explorer Object Data Remote Execution Vulnerability Nerijus Krukauskas (Aug 22)