Hacker News new | past | comments | ask | show | jobs | submit login

> We discovered a drive-by code execution vulnerability on Windows 10 via IE11/Edge Legacy and MS Teams, triggered by an argument injection in the Windows 10/11 default handler for ms-officecmd: URI

> Exploitation through other browsers requires the victim to accept an inconspicuous confirmation dialog.

No confirmation needed with Windows 10 and IE11 or Edge Legacy




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: