terbayang bro haris keje kat myCERT & wear that_uniform.

On Tue, Feb 1, 2011 at 11:45 PM, Harisfazillah Jamel
<[email protected]> wrote:
> Forget to put in Mycert link
>
> MA-265.012011 : MyCERT Alert - Critical Vulnerability in Microsoft Windows
>
> http://www.mycert.org.my/en/services/advisories/mycert/2011/main/detail/801/index.html
>
> On Tue, Feb 1, 2011 at 11:37 PM, Harisfazillah Jamel
> <[email protected]> wrote:
>> Assalamualaikum and salam sejahtera,
>>
>> How far are we from wild working script?
>>
>> Microsoft Windows MHTML script injection vulnerability
>>
>> http://www.kb.cert.org/vuls/id/326549
>>
>> The vulnerability exists due to the way MHTML interprets
>> MIME-formatted requests for content blocks within a document. It is
>> possible under certain conditions for this vulnerability to allow an
>> attacker to inject a client-side script in the response of a Web
>> request run in the context of the victim's Internet Explorer. The
>> script could spoof content, disclose information, or take any action
>> that the user could take on the affected Web site on behalf of the
>> targeted user.
>>
> _______________________________________________
> Owasp-Malaysia mailing list
> [email protected]
> https://lists.owasp.org/mailman/listinfo/owasp-malaysia
>
> OWASP Malaysia Wiki
> http://www.owasp.org/index.php/Malaysia
>
> OWASP Malaysia Wiki Facebook
> http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420
>
_______________________________________________
Owasp-Malaysia mailing list
[email protected]
https://lists.owasp.org/mailman/listinfo/owasp-malaysia

OWASP Malaysia Wiki
http://www.owasp.org/index.php/Malaysia

OWASP Malaysia Wiki Facebook
http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420

Reply via email to