Dear Gavin Hanover, In this very case it's really seems to be mIRC problem ("unfiltered shell characters"). It doesn't depend on URL handler and will work with any valid URL handler. You can reproduce same vulnerability by entering http:%xx../../../../../../../../../../../windows/system32/calc.exe".bat Exploitable under Windows XP, not exploitable under Vista. --Wednesday, October 3, 2007, 11:59:45 PM, you wrote to jinc4fareijj@xxxxxxxxxxx: GH> is this a mirc bug or a mail client bug? >> mailto:%xx../../../../../../../../../../../windows/system32/calc.exe".bat >> -- ~/ZARAZA http://securityvulns.com/