lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1140882882.4348.27.camel@Stargate.iatechconsulting.com>
Date: Sat Feb 25 15:50:28 2006
From: nodialtone at comcast.net (nodialtone)
Subject: WinAmp Vulns

On Sat, 2006-02-25 at 10:39, Andrew Smith wrote:
> ncfoucs: The website you have requested does not exist.
> 
> On 24 Feb 2006 18:44:54 -0500, nodialtone <nodialtone@...cast.net> wrote:
> > Question for the list about the recent winamp m3u vuln.
> >
> > secway.org reports they had discovered it and notofied the vendor.
> >
> > ncfocus.com has also reported that they discovered it and have notofied
> > the vendor.
> >
> > Are these orgs/companies related perhaps?
> >
> > Thanks,
> >
> > --
> > -nodialtone
> >
> > No BS security forums:
> > http://www.iatechconsultng.com
> >
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> >

Yep typo, my bad... here are the full url's

http://www.nsfocus.com/english/homepage/research/advisory.htm

and...

http://www.secway.org/vuln.htm



-- 
Unique Security Forums at:
http://www.iatechconsulting.com

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060225/5a370a2f/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ