On Mon, 1 Dec 2003 15:37:04 -0800 "Thor Larholm" <[EMAIL PROTECTED]> wrote:
> Each and every command execution vulnerability in Internet Explorer over > the last few years have all depended on the functionality of local > security zones. Whenever you are crafting an exploit, you want to > navigate a window object to a local security zone, inject some scripting > or HTML into the window object and subsequently use the features of the This is nonsense. Comment on these ones: http://www.guninski.com/iexla.html http://www.guninski.com/signedactivex2.html all the java stuff at: http://www.guninski.com/browsers.html there are much more, but i am too lazy to exploder crap for you. georgi _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
