lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 28 Jul 2012 15:05:27 +0300 From: Henri Salo <henri@...v.fi> To: BlackHawk <hawkgotyou@...il.com>, full-disclosure@...ts.grok.org.uk Subject: Re: Pligg 0.9/1.x remote code execution On Sat, Jul 21, 2012 at 06:34:46PM +0200, BlackHawk wrote: > Exploit attached, info inside. 2.0 versions could still be affected > > http://pastebin.com/MSXFSvzA Do you know if these issues have been fixed in some version of Pligg and if these have CVE-identifiers? I tried to ask this from forum.pligg.com, but my post was removed. - Henri Salo _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists