lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <000001c6adaa$f1a86b70$02070a0a@mbox>
Date: Sat, 22 Jul 2006 23:21:50 +0700
From: "m" <m@...v.com>
To: <bugtraq@...urityfocus.com>
Subject: RE: [EEYEB-20060227] D-Link Router UPNP Stack Overflow

No - it is also vulnerable to this issue, B1 and B2.

-----Original Message-----
From: kala_z@...mail.com [mailto:kala_z@...mail.com] 
Sent: Saturday, July 22, 2006 4:28 AM
To: bugtraq@...urityfocus.com
Subject: Re: [EEYEB-20060227] D-Link Router UPNP Stack Overflow

What about D-Link DI-524 Rev. B2? Is it vulnerable too? has it been fixed
for this model?

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ