lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <DUB131-W18504156436B06A26993ECD0AE0@phx.gbl> Date: Thu, 25 Jun 2015 15:42:41 +0100 From: ICSS Security <ctrlaltdelete@...look.pt> To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org> Subject: [FD] Recomendation: Flaw in K9 Web Protection 4.4.268 A flaw exist in K9 Web Protection version 4.4.268 that allow any user to bypass the K9 Web Protection filter by using proxies. Proxies are well known to bypass ISP filters as well any parental block aplication such as K9 Web Protection. For this test we have run 638 listed proxies and 25 could bypass the "Proxy Avoidance" category because they were incorrectly categorized. _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/