Secunia is reporting on three vulnerabilities in IE6 running on XP SP2. Any of these, in combination with an inappropriate behaviour where the ActiveX Data Object (ADO) model can write arbitrary files, can be exploited to compromise a user's system. Moreover, the vulnerability can be used to delete files from the user's system. Secunia says 'Solution: Use another product.'
http://it.slashdot.org/it/05/01/09/0737 ... 13&tid=218
http://secunia.com/advisories/12889/
Στην παρακάτω σελίδα υπάρχει link το οποίο δημιουργεί το αρχείο "ie6vulnerability.jmcardle" στον κατάλογο c:\ όταν επιλεχθεί (από IE 6).
http://www.jmcardle.com/?postid=77
Critical IE6/SP2 Exploit - Solution : Use another product
- HdkiLLeR
- Venus Project Founder
- Posts: 4356
- Joined: Tue Jan 27, 2004 4:41 pm
- Academic status: Alumnus/a
- Gender: ♂
- Location: New York, NY
- Contact:
Re: Critical IE6/SP2 Exploit - Solution : Use another produc
Χαχαχα!!!...ΙΕ6...όσο και να το βάφεις το σκαρί πάντα σάπιο μένειminas wrote: Secunia says 'Solution: Use another product.'

-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GCS d-->--- s+:+ a- C++(+++) BILS++++$ P--- L++++>+++++ E--- W+++ N+ o+ K w--
O M+ V-- PS++>+++ PE- Y++ PGP++ t+ 5+ X+ R* tv b++ DI- D+ G+++ e+++>++++ h r++ y++
------END GEEK CODE BLOCK------
"UNIX is basically a simple operating system, but you have to be a genius to understand the simplicity." -- Dennis Ritchie
Version: 3.12
GCS d-->--- s+:+ a- C++(+++) BILS++++$ P--- L++++>+++++ E--- W+++ N+ o+ K w--
O M+ V-- PS++>+++ PE- Y++ PGP++ t+ 5+ X+ R* tv b++ DI- D+ G+++ e+++>++++ h r++ y++
------END GEEK CODE BLOCK------
"UNIX is basically a simple operating system, but you have to be a genius to understand the simplicity." -- Dennis Ritchie