[Previous] [Next] [Index] [Thread]

Re: ActiveX security hole reported.



...stuff deleted ...
> 
> This stuff, though:
> 
> <A HREF="http://home.netscape.com/comprod/mirror/index.htm">
> <OBJECT ID="Exploder1" WIDTH=86 HEIGHT=31
>  CODEBASE="http://www.halcyon.com/mclain/ActiveX/Exploder.ocx"
>  CLASSID="CLSID:DE70D9E3-C55A-11CF-8E43-780C02C10128">
>     <PARAM NAME="_Version" VALUE="65536">
>     <PARAM NAME="_ExtentX" VALUE="2646">
>     <PARAM NAME="_ExtentY" VALUE="1323">
>     <PARAM NAME="_StockProps" VALUE="0">
> <IMG SRC="../../images/now20_button.gif" WIDTH=88 HEIGHT=31></OBJECT></A>
> 
> is new to me.  It seems to be instructing IE to download
> the Exploder.ocx binary, and run it (after giving the user
> some little popup warnings to make sure he didn't click
> by accident).  Does anyone have a pointer to the semantics
> of this sort of <OBJECT> tag?
> 
> - -- -
> David M. Chess                    |     Remember:
> High Integrity Computing Lab      |       it's your pineal gland,
> IBM Watson Research               |           but it's their antenna!
> 
Check out the W3C Working Draft "Inserting Objects into HTML"

http://www.w3.org/pub/WWW/TR/WD-object

					  - sas

------------------------------------------------------------------------
"The last thing I want to do is deal        | Scott Sesher,   Sys Admin
with a bunch of people who want something." | Pittsburg State University
                                            | sas@pittstate.edu
                         Major Major        | Talk Net: (316)-235-4606
------------------------------------------------------------------------


References: