Bugtraq mailing list archives
Re: Active X exploit.
From: andreas () ARTCOM DE (Andreas Bogk)
Date: Wed, 27 Aug 1997 00:40:40 +0200
"Peter" == Peter Shipley <shipley () DIS ORG> writes:
Peter> There is a new expliot for active X Peter> http://www.network-security.com/activex/ This exploit is not new, a similiar program has been around on http://www.thur.de/home/steffen/activex/index_e.html since march. And the principle is the same on all ActiveX exploits. There simply is no security, ActiveX controls are simple DLLs. Andreas -- Never underestimate the value of fprintf() for debugging purposes.
Current thread:
- Re: Active X exploit. Andreas Bogk (Aug 26)
- <Possible follow-ups>
- Re: Active X exploit. Paul Leach (Aug 26)
- Re: Active X exploit. Casper Dik (Aug 27)
- Re: Active X exploit. David Holland (Aug 27)
- Re: Active X exploit. Alan Cox (Aug 27)
- Re: Active X exploit. Lutz Donnerhacke (Aug 27)
- Re: Active X exploit. Paul Leach (Aug 27)
- Re: Active X exploit. Erik Tornstam (Aug 28)
- Re: Active X exploit. Frank Kargl (Aug 28)