[14344] in bugtraq

home help back first fref pref prev next nref lref last post

Re: IE and Outlook 5.x allow executing arbitrary

daemon@ATHENA.MIT.EDU (Sylwester =?iso-8859-2?Q?Zar=EAbsk)
Mon Mar 20 04:57:30 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-2
Content-Transfer-Encoding: 8bit
Message-Id:  <38D1EE26.59FF3008@isp.net.pl>
Date:         Fri, 17 Mar 2000 09:34:47 +0100
Reply-To: Sylwester =?iso-8859-2?Q?Zar=EAbski?= <sylwek@ISP.NET.PL>
From: Sylwester =?iso-8859-2?Q?Zar=EAbski?= <sylwek@ISP.NET.PL>
X-To:         Noam Rathaus <noamr@beyondsecurity.com>,
              Bugtraq mailing list <bugtraq@securityfocus.com>
To: BUGTRAQ@SECURITYFOCUS.COM

Noam Rathaus wrote:
>
> Try pressing escape and be amazed ... mine executed it.

Yes.. You are right.. I check my %TEMP% and there it was :-((
George's page doesn't execute it because my %TEMP% is other
than C:\TEMP or C:\WINDOWS\TEMP..

--
pozdrawiam..

       ## ##      | Sylwester Zarjbski - ISP Group |
      #### ##     |   e-mail: sylwek@isp.net.pl    |
     ##  ## ##    |      ICQ uin: #45780888        |
    ##  #### ##   |    Administrator ISP.NET.PL    |

home help back first fref pref prev next nref lref last post