lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040305171826.24005.qmail@www.securityfocus.com> Date: 5 Mar 2004 17:18:26 -0000 From: JeiAr <security@...ftech.org> To: bugtraq@...urityfocus.com Subject: Re: Invision Power Board 1.3 Final Path Disclosure Vulnerability In-Reply-To: <20040305130832.64623.qmail@...25104.mail.ukl.yahoo.com> This "vulnerability" was actually reported by GulfTech Security on March 2nd http://www.gulftech.org/03022004.php and posted on the governmentsecurity.org message board March 3rd http://www.governmentsecurity.org/forum/index.php?showtopic=7008 >~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~* > >Product: Invision Power Board > http://www.invisionboard.com >Versions: 1.3 Final (and probably lower) >Bug: Disclosure of install path >Impact: Attacker learns the local install > path of Invision Power Board and the > htdocs >Date: March 05, 2004 >Author: Shaun Colley > Email: shaunige@...oo.co.uk > WWW: http://www.nettwerked.co.uk > >~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~* >