lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BAY8-F103G0JmwVbi2900072192@hotmail.com>
Date: Fri, 02 Jan 2004 02:07:36 +0000
From: "Peter Winter-Smith" <peter4020@...mail.com>
To: bugs@...uritytracker.com, bugtraq@...urityfocus.com, news@...uriteam.com, vuln@...unia.com, vuln@...urity.nnov.ru, vulndb@...urityfocus.com, vulnwatch@...nwatch.org
Subject: Re: Switch Off Multiple Vulnerabilities


Hi,

Re: http://www.elitehaven.net/switchoff.txt

I neglected to mention the fact that just issuing a regular HTTP GET
request with no other headers seems to cause the application to error
within the module 'msvcrt.dll'. I have not attempted to investigate why
this happens. Such a request may be as follows:

--------------------------------------------------------------
GET / HTTP/1.1


--------------------------------------------------------------

How strange ;o)

-Peter Winter-Smith

_________________________________________________________________
Find a cheaper internet access deal - choose one to suit you. 
http://www.msn.co.uk/internetaccess



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ