lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <238db9430601260855o5a7e1687ic0da5ec5fad976e8@mail.gmail.com> Date: Thu Jan 26 20:03:12 2006 From: whatstheaddress at gmail.com (Ryan Smith) Subject: Shareaza Remote Vulnerability There is a vulnerability in the current version of Shareaza, a P2P file sharing product. It results in remote code execution. Please see the advisory for more details. There is no patch. Credit: These vulnerabilities were discovered and researched by Ryan Smith. Contact: WhatsTheAddress@...il.com Details: http://www.hustlelabs.com/<http://www.security.nnov.ru/?gohttp://www.rem0te.com/public/images/clamav.pdf> -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060126/c337bdc0/attachment.html