Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Internet Explorer executable files download filter protection bypass
Published:15.10.2007
Source:
SecurityVulns ID:8255
Type:client
Threat Level:
4/10
Description:It's possible to upload file to temporary internet files folder by adding GET parameters to filename, e.g. http://example.com/program.exe?1.cda/
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
Original documentdocumentlaurent gaffie, playing for fun with <=IE7 (15.10.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod