[Esa-l] Yet ANOTHER Microsoft Active Scripting hole
    Brett Glass 
    brett at lariat.org
       
    Fri Apr 20 08:18:05 PDT 2001
    
    
  
According to Georgi Guninski, users of Outlook Express who have turned 
off Active Scripting are STILL subject to exploitation by malicious 
scripts that employ XML scripting. See
http://www.guninski.com/iexslt.html
for an example. It looks as if attachments with .eml, .xsl, and .xml 
extensions should be mangled, defanged, or even poisoned.... IFRAME tags 
are already disabled by John's santizier if they appear in the body of 
the message, but not if they're in .eml files.
--Brett
    
    
More information about the esd-l
mailing list