![]() |
New IE exploits discovered ...
Just when a patch had been released to fix the latest IE code execute bug we seem to have another one on our hands. From the original post:
---- I have recently been playing around with the xml+windows media player exploit, and it seems that even with the new Microsoft patch applied, the vulnerability works. I have tried it on 7 different people, on win2k and xp, and it worked everytime. The 8th person was using DAP (Download Acceselerator Plus), so it asked him if he wanted to download the executable. IE hacks like Dybuk Explorer are not affected by the vulnerability as well. ---- AFAIK harmless test here: http://mindlock.bestweb.net/wmp.htm |
well it say it repalce's the windows media player file with a patch or some thing but nothing really happen.
|
about time to switch to http://www.lindows.com
|
Quote:
|
All times are GMT -7. The time now is 01:04 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123