http://www.packetfocus.com/shell_exploit.htm
IE will execute the shell: command locally but prompts the user to open / save the file if used with an anchor. But what is this was used with another IE exploit that may not have system privs but ran shell: locally- wouldn't that have system privs then or would that run under the browser? Interesting so far- Hopefully this will help the effort to promote open source standards to move away from M$ web monopoly. Until then I will just uses BBS's-- hehehehehehe Anyone up for a good game of Tradewars ;) Joshua Perrymon Sr. Network Security Consultant PGP Fingerprint 51B8 01AC E58B 9BFE D57D 8EF6 C0B2 DECF EC20 6021 **********CONFIDENTIALITY NOTICE********** The information contained in this e-mail may be proprietary and/or privileged and is intended for the sole use of the individual or organization named above. If you are not the intended recipient or an authorized representative of the intended recipient, any review, copying or distribution of this e-mail and its attachments, if any, is prohibited. If you have received this e-mail in error, please notify the sender immediately by return e-mail and delete this message from your system. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
