Re: Exploit In Internet Explorer

看板Bugtraq作者時間18年前 (2007/07/31 05:23), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/4 (看更多)
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig56BC7F085BA8E6EA74B4ADEA Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable RaeD@BsdMail.Com wrote: > Discovred By : Hasadya Raed > Contact : RaeD@BsdMail.Com - Israel > ----------------------------------- > Now You Can To Download Exe Files And To Run Without Msgs : > > Exploit : [bla bla bla] That's old, man... already recognized by all security software and protec= ted against, as far as I know. --------------enig56BC7F085BA8E6EA74B4ADEA Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.4 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFGrlQKgcNpQSFIZUgRAkCBAJ9gYGZ2gLHs8+W4zxdSaEooAtjAvQCgy1lS pP/wyWF0vIyLmfBB95fWYH8= =rdhM -----END PGP SIGNATURE----- --------------enig56BC7F085BA8E6EA74B4ADEA-- Chiacchiera con i tuoi amici in tempo reale! http://it.yahoo.com/mail_it/foot/*http://it.messenger.yahoo.com
文章代碼(AID): #16hbRS00 (Bugtraq)
文章代碼(AID): #16hbRS00 (Bugtraq)