lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080320015356.14671.qmail@securityfocus.com>
Date: 20 Mar 2008 01:53:56 -0000
From: david130490@...mail.com
To: bugtraq@...urityfocus.com
Subject: Pizco vulnerable to buffer overflow in activex

It's possible that users that uses Pizco were vulnerable to the same vulnerability that "Aurigma ImageUploader4.ocx" that found Elazar Broad.

This post is this:
http://www.securityfocus.com/bid/27539


The version of ImageUploader4 is 4.1.36.0

And I say that it's possible because I find a site  where I download it, but I don't saw where the Activex control is used.

Web with the vulnerable control:
http://cdnimg.piczo.com/images/uploader/piczo_fast_uploader.cab


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ