January 29th, 2006 07:30 AM
vulnerable script "http://www.antionline.com/sedit.php"
Warning: getimagesize(): Read error! in /data/****/***/sedit.php on line 104
the error page could be used...
March 29th, 2004 09:55 PM
a copy of my recent advisory on ie.6 "ms-its: and mk:@MSITStore: vulnerability "
March 29th, 2004 02:13 PM
were ya drunk when u posted this?!!delete it or soon you 'll get ashed.at least change the way the question is asked somthing like "Hi i have been infected with a trojan that i think got into my...
March 19th, 2004 01:26 PM
yesterday i was playing with dll files ie uses when i found some interesting **** inside one of 'em it was a credits page but fo some reason those azzholz @ m!crosoft had encrypted them names and...
March 17th, 2004 09:11 PM
see for your self:
na, the only thing hazerdous...
March 17th, 2004 08:41 PM
frankly i ain't know , even those gurus @secunia and securityfocus got a little bit mixed up with this i should have sent this to microsoft at first place they give you more info of what patch...
March 17th, 2004 10:27 AM
well no solution from securityfocus but it seems like fully patched systems are not vulnerable by fully patched i mean you have to patch both the...
March 16th, 2004 09:29 PM
This is a copy of the document i sent to securityfocus.com two days ago hope you enjoy it.
-----BEGIN PGP SIGNED MESSAGE-----
Internet explorer shell url handler :
December 5th, 2003 09:52 AM
not enough info ,what ver. of ie your are using which service packs you have installed,what is the site you are refferin to,......
well the only help i can give ya with the info you have provided is...
December 4th, 2003 10:23 AM
December 4th, 2003 09:02 AM