IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New That sounds like the edgiest of edge cases
Not saying it's impossible to exploit, but just about any other method must be easier.
--

Drew
New Pretty much. The more likely target is e-mail (URLs, attachment names, ...)
     Krebs on "Trojan Source" - (Another Scott) - (6)
         How would this be exploited? - (drook) - (4)
             If a GUI honors it but the compiler does not - (scoenye) - (2)
                 That sounds like the edgiest of edge cases - (drook) - (1)
                     Pretty much. The more likely target is e-mail (URLs, attachment names, ...) -NT - (scoenye)
             "What are you missing?", you ask. - (pwhysall)
         Not quite new - (scoenye)

You have mushrooms walking around. What do you expect?
84 ms