win-mailto.txt...

- AV AC AU C I A
发布: 2006-04-28
修订: 2025-04-13

Multiple browsers Windows mailto protocol Office 2003 file attachment exploit: Application protocols handling in Microsoft Windows is badly designed, i.e. when someone types mailto:someone@somewhere.com into a browser the protocol is first looked up under HKEY_CLASSES_ROOT\%protocol%\shell\open\command, if it is a protocol that is allowed under the current user context then the value is simply replaced by the contents in the address bar at %1.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息