Subject: Re: [xsl] HTML5 semantics and XSLT From: "Norm Tovey-Walsh ndw@xxxxxxxxxx" <xsl-list-service@xxxxxxxxxxxxxxxxxxxxxx> Date: Wed, 23 Feb 2022 16:51:19 -0000 |
> Amazingly, it appears to be true that opened in a current web browser, > a document like the following will proceed to execute the script it > contains. HTML email was always evil. The webmail clients that Ibve used recently have all been removing images and scripts before presenting the messages, I think. Opening random web pages is risky. And if youbve disabled some of the security features in your browser because you want, for example, to run scripts off of file: URIs, youbre just making things even riskier for yourself. > Otherwise, at least as reported in the post cited above, an OpenOffice > document, when previewed in certain execution contexts, can act much > like a Word document with embedded malware. Seems likely. Be seeing you, norm -- Norman Tovey-Walsh <ndw@xxxxxxxxxx> https://nwalsh.com/ > In every work of genius we recognize our own rejected thoughts; they > come back to us with a certain alienated majesty.--Emerson [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
Current Thread |
---|
|
<- Previous | Index | Next -> |
---|---|---|
Re: [xsl] HTML5 semantics and XSLT, Liam R. E. Quin liam | Thread | Re: [xsl] HTML5 semantics and XSLT, David Carlisle d.p.c |
Re: [xsl] HTML5 semantics and XSLT, Michael Kay mike@xxx | Date | Re: [xsl] HTML5 semantics and XSLT, David Carlisle d.p.c |
Month |