[19774] in bugtraq

home help back first fref pref prev next nref lref last post

Re: feeble.you!dora.exploit

daemon@ATHENA.MIT.EDU (Jeff Beckley)
Thu Mar 22 14:24:51 2001

Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Message-ID:  <5.1.0.12.0.20010321134858.02604c70@adept.qualcomm.com>
Date:         Wed, 21 Mar 2001 13:59:34 -0800
Reply-To: Jeff Beckley <beckley@QUALCOMM.COM>
From: Jeff Beckley <beckley@QUALCOMM.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <10359935.985189714218.JavaMail.imail@slippery>

At 07:48 AM 3/21/2001 -0800, http-equiv@excite.com wrote:
>Further to all of this, we include a generic more illustrative (and user
>friendly test working example) [at the end of this batch of quotes].
>
>This defeats the so-called "Allow executables in HTML content" being
>disabled.

This inline scripting hole has been fixed in Eudora 5.1.  A beta of 5.1 can
be found at <http://www.eudora.com/betas/>.  The final release of 5.1 will
be out very soon.

home help back first fref pref prev next nref lref last post