An attacker\r\n* could try to exploit the vulnerability by constructing a malicious\r\n* cursor or icon file that could potentially allow remote code\r\n* execution if a user visited a malicious Web site or viewed a\r\n* malicious e-mail message. :.\r\n*\r\n*\r\n*\r\n* (universal - for all affected systems)\r\n* -\r\n* Description:\r\n* A remote code execution vulnerability exists in the way that\r\n* cursor, animated cursor, and icon formats are handled. , "cvelist":, "modified": "T00:00:00", "href": "", "id": "SSV:8979", "sourceData": "\n /* Modified by Vertygo aka Ivanm all credits goes to\r\n houseofdabus Berend-Jan Wever and to milw0rm*/\r\n/* Added string.h /str0ke */\r\n/* HOD-ms05002-ani-expl.c: : PUBLIC v.0.2\r\n*\r\n* Copyright (c) 2004-2005 houseofdabus.\r\n*\r\n* (MS05-002) Microsoft Internet Explorer.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |